You are on page 1of 6

Deoxyribonucleic Acid (DNA) for a Shared Secret Key Cryptosystem with Diffie

Hellman Key sharing technique

Asish Aich, Alo Sen, Satya Ranjan Dash, Satchidananda Dehuri


Computer Science and Engineering, KIIT Department of Systems Engineering, Ajou
University, University
Patia, Bhubaneswar-751024, INDIA. San 5, Woncheon-dong, Yeongtong-gu,
Email: acrana.dgp09@gmail.com, Suwon – 443-749, South Korea.
alosen10@gmail.com, sdashfca@kiit.ac.in Email: satch@ajou.ac.kr

Abstract— A shared secret key based symmetric Thymine (T), Cytosine (C) and Guanine (G), the bases
cryptographic algorithm using Diffie Hellman key sharing represent genetic code. Generally, DNA exists as double-
technique has been proposed in the paper. The shared secret key stranded molecules. Complementary form of two DNA
is used for encryption as well as decryption of the intended plain strands (A-T or C-G) gets hydrogen bonded together to form
text. But, we are not transferring the original shared secret key a double-helix structure. DNA was first discovered by
through the channel. We are using Diffie Hellman key sharing Friedrich Miescher and James D. Watson-Crick [3]
technique to generate the shared secret key in both the side by developed a pairing rule which defines that Adenine (A) can
exchanging the public key of the sender and receiver with each only pair with Thymine (T) as well as Cytosine(C) can only
other through the channel. DNA Hybridization technique has
pair with Guanine(G) for the formation of a hydrogen bond
been used to produce the cipher text from the DNA sequence of
with double helical structured DNA. DNA comprises of long
plain text and the shared secret key. A numerical study with the
basic parametric assumption confirms that the proposed
sequence and responsible to transfer the genetic information.
cryptosystem is very scalable, secure and robust to use in real Oligonucleotides or ssDNA is two long single sided
time system. structures which can be found when DNA can be separated
in a way where all of the hydrogen bonds between the
Keywords— DNA Hybridization; Encryption-Decryption; nucleotides get dissolved.
Prime; Diffie Hellman Key sharing
III. LITERATURE SURVEY
I. INTRODUCTION DNA cryptography has been discovered after the
Cryptology, the basis of security for all the information. research of Adleman [1]. Further, It has been extended by
The applications of cryptography are not limited to only Lipton [4], who solve NP complete problem using DNA
mailing, banking, defense, it has been extended to online computing. Boneh, Dunworth and Lipton [5] confirmed that
banking transactions and e-commerce, etc where the by using DNA computing, the Data Encryption Standard
sensitive information while transferring through channel can (DES) cryptographic protocol can be broken. DNA
be eavesdropped by the intruders. So, security only plays the molecules contain low energy efficiency, the huge
great role to prevent and detect the authenticated system, parallelism, and extraordinary large information storage
data and network. Now, cryptology combines two areas. The capacity [6, 7]. DNA cryptography [8, 9] can be added with
two important areas are cryptography is the art to DNA computing, where DNA will take the role of
communicate securely through the insuring communication information carrier and modern biological technologies will
medium, whereas cryptanalysis is the art to decipher the take the role of implementation tool. The important features
message who is not the intended receiver. Cryptography and of DNA molecule stated above can be used for security
steganography both the technique is used for providing purposes such as signature, authentication, encryption etc.
security, but they are not efficient enough. A new [10]. Various methods of DNA cryptography were invented
technology, DNA cryptography took birth by Adleman [1] in [11, 12] in recent years. No particular, specific theory is
DNA computing and Risca [2] in the DNA information available to apply DNA molecules in cryptography [13], [14]
project when the most popular cryptographic algorithms such but still researches are continuing their research on security
as Data Encryption Standard (DES) and Adi Shamir, Ron based on modern DNA technology for the successful
Rivest, and Len Adleman (RSA 768) being cracked. experimental results. In current years, the developed popular
DNA technologies are Polymerase Chain Reaction (PCR),
II. BASIC OF DNA CRYPTOGRAPHY DNA synthesis, and DNA digital coding [15]. According to
DNA is abbreviated as deoxyribonucleic acid. DNA is Watson-Crick complementary pair, PCR is a very fast DNA
important macromolecule (germ plasma) that is necessary for amplification technology. With the two primer pair’s namely
life consist of many nucleotides. Each nucleotide is on a forward and reverse primer, the plain text-encoded sequence
single base and there total four primary bases Adenine (A), can be amplified. DNA hybridization is also a popular

978-1-4799-4445-3/15/$31.00 ©2015 IEEE


technology were the primary bases (A-T
T or C-G) got II. Extra bits(i.e. Forw
ward primers and End primers)
hydrogen bonded together. have to be attacheed to the above DNA coded
output (cf. Figure 1)):
IV. OUR APPROACH
In our approach, a shared secret keey based DNA
cryptosystem has been proposed. The symmetric key
cryptosystem has been developed by different DNA Forward Primer DNA
A coded output End Primer
technologies like DNA encoding scheme, s DNA
hybridization, DNA primers. The encryptionn process is done
with DNA hybridization technology. This proposed
Figure 1: Structure of thee DNA sequence with primers.
algorithm is based on symmetric key crypttography system
where a shared secret key is used for encryp yption as well as
decryption of the message. Diffie Hellmann key exchange III. Convert the whole DNA sequence into a binary
technique[17] is a very famous and most m appropriate equivalent sequencce with the following binary
technique to compute the cryptographic shaared secret key. DNA coded schemee (cf. Table 2).
Here, we have used this key sharing technnique where the
original shared secret key is not actually trannsmitted over the Table 2. Binaryy DNA coded set
channel. The two parties’ sender as well as the receiver
should have to agree on two values. For thhat purpose, we Nucleotide A C G T
have used publicly available NCBI (Natioonal Council of
Biotechnological Information) database to chhoose one agreed
upon value and primers. The sender shoulld have to send Code 00 01 10 11
Primers, Organism name with the NCBI database d and the
type of genomic data, and the two agree upoon values for the
computation of the shared secret key to the reeceiver: IV. During the encryption process of the plain text, the
DNA hybridizationn is performed only for the
A. The Proposed approach binary ‘1’ in the binnary equivalent sequence. If the
binary bit is foundd to be ‘0’ no operation takes
The proposed algorithm is fragmented into encryption, place. Wherever thhe binary digit is ‘1’ then the
decryption and key generation part respeectively, in the corresponded 10 baases of the DNA sequence of
following subsections 1, 2, and 3. We have chosen the the shared secret keyk is complemented to form
Nucleotide Sequence of “Canis lupus familiaris” to oligonucleotide sequuence and thus the plain text is
determine the primers and one agreed upon value for Diffie finally converted to t cipher text .The digits are
Hellman key sharing technique. Figure 2 illustrates the compared with thee DNA sequence in reverse
proposed model. order.

1. Encryption Process
V. The cipher text is then transferred through the
open communicatioon channel.
Encryption of the plain text into cipher text
t follows the
following steps: 2. Decryption Processs
I. The plain text is transferred into thhe DNA coded
output by following DNA coded set which was Decryption can be done by thhe following steps:
proposed by Clell and Risca [16]], where DNA
coding can be expressed only for capital letters, I. DNA hybridizatioon take place between the
digits, and for punctuation marks. The
T DNA coded received cipher teext and the DNA equivalent
set is as follows: sequence of the shaared secret key in the following
Table 1. DNA coded set
way: In the binary sequence,
s ‘1’ will be considered
if the every 10 bases of the cipher text is equal with
the complementaryy form of the 10 bases of the
shared secret key frrom the reverse order, otherwise
it will be consideredd as ‘0’.

II. Then the generated binary sequence is converted to


the DNA coded output
o with forward and end
primer using the above
a mentioned binary coded
scheme.
III. Finally the two primers are removed from the DNA primer is added to the end of the DNA coded output. The
coded output and then DNA coded output is converted DNA sequence with primers:
converted to plain text which is the original GTCCACATCAGTTCGATTCGCAGCAGCCC.
message send by the sender.
Now, the binary equivalent of the DNA sequence with
3. Key Generation Procedure primers (cf. Table2) :
110110100010000110001101011011000101101110001110
We have used Diffie Hellman key sharing 0011101010 (Total 58 bits long). For generating shared
technique[17] to produce the shared secret key. According secret key Diffie Hellman key sharing technique is applied:
to Diffie Hellman technique at first, sender and receiver here, we choose n as nucleotide sequence. Now, we have to
agreed upon two values (n= a large prime number, g= convert it in integer value which will be also a prime
generator of n). Then they decide their private key and
number. So, the converted nearest primer value of the
compute their public key. After that, they exchange their
public key with each other through the open nucleotide sequence is: 42179. Let, value of g=983,
communication channel. Finally, they calculate the shared generator of n upon those two values, sender as well as
secret key which will be used to encrypt the message at receiver will agree. Now, for simplicity, we have
sender side as well as to decrypt the message at receiver considered Private Key of sender and receiver is 1 and 70
side. Figure 3 illustrates the shared secret key generation
respectively. Now, they will calculate their public key
procedure.
using Diffie Hellman public key creation formula. After
computation, Public key of sender=983.0 which will be
V. NUMERICAL STUDY AND RESULTS
transfer to receiver and Public key of receiver =30748.0
A numerical experiment has been done to explain the which will be transferred to sender through insecure
working principle of our proposed algorithm. We have
channels. Then they will calculate the shared secret key:
considered the plain text: “CAT”. At first the nucleotide
sequence is chosen from NCBI database of the organism Same Secret key at receiver: 30748.0. Same Secret key at
DOG. The scientific name of the organism is “Canis lupus sender: 30748.0. Now, the shared secret key will be
familiaris”. NOW, the following nucleotide sequence is converted to equivalent DNA sequence:
chosen to decide the primers and value of n (one of the GCATTAACAGAGAGG. But, to perform DNA
agreement upon value for sender and receiver) for Deffie hybridization it is required that the length of an equivalent
Hellman key sharing technique.
DNA sequence of shared secret keys should have to be 580
GTCCACATCATTGGAATGCCATTTCTTATTCATCAGTGG bits as the length of DNA coded output with primer is =58.
GCCCGGGGAGGAGAGTGGGTGTTTGGGGGGCCCCTCTG So, the length of an equivalent DNA sequence of the shared
CACCATTATCACATCCCTGGATACCTGCAACCAGTTTGC secret key is made equal by concating the same sequence
CTGTAGTGCCATCATGACTGTGATGAGTATAGACAGGTACTTG until the length will be 580. The resulting equivalent DNA
GCTCTCGTCCAACCATTTCGACTTACAAGTTGGAGAACGAGGTA
sequence of shared secret keys of length 580 bits:
CAAGACCATCCGCATCAATTTGGGCCTTTGGGCAGCTTCCTTCA
TTCTGGCGCTGCCTGTCTGGGTCTACTCGAAGGTCATCAAATTT
GCATTAACAGAGAGGGCATTAACAGAGAGGGCATTAAC
AAAGACGGCGTGGAGAGTTGTGCTTTTGATTTAACATCCCCTGA
AGAGAGGGCATTAACAGAGAGGGCATTAACAGAGAGGG
CGATGTACTCCGGTATACACTTTATTTGACGATAACAACTTTTTT CATTAACAGAGAGGGCATTAACAGAGAGGGCATTAACA
TTTCCCTTTGCCTTTGATTTTGGTGTGCTATATTTTAATTTTATGC GAGAGGGCATTAACAGAGAGGGCATTAACAGAGAGGGC
TATACTTGGGAGATGTATCAACAGAATAAAGATGCAAGATGTT ATTAACAGAGAGGGCATTAACAGAGAGGGCATTAACAG
ACAATCCCAGTGTTCCAAAAGAGAGAGTGATGAAGCTGACAAA AGAGGGCATTAACAGAGAGGGCATTAACAGAGAGGGCA
GATGGTGCTGGTGCTGGTGGCGGTCTTTATCCTAAGTGCTGCCC TTAACAGAGAGGGCATTAACAGAGAGGGCATTAACAGA
GAGGGCATTAACAGAGAGGGCATTAACAGAGAGGGCAT
CCTACCACGTGATACAACTGGTGAACTTAAAGATGCAGCAGCC
TAACAGAGAGGGCATTAACAGAGAGGGCATTAACAGAG
C. AGGGCATTAACAGAGAGGGCATTAACAGAGAGGGCATT
GTCCACATCA: The forward primer, AACAGAGAGGGCATTAACAGAGAGGGCATTAACAGAGA
GCAGCAGCCC : The end primer, n : The nucleotide GGGCATTAACAGAGAGGGCATTAACAGAGAGGGCATTA
ACAGAGAGGGCATTAACAGAGAGGGCATTAACAGAGAG
sequence between forward and end primer(Total 580 bits GGCATTAACAGAGAGGGCATTAACAGAGAGGGCATTAA
length). At first, the plain text is converted to the following CAGAGAGGGCATTAACAGAGAGGGCATTAACAGAGAGG
GCATTAACAG.
DNA coded output: GTTCGATTC. Then forward primer is
Now, DNA Hybridization is done with the DNA sequence
added to the header of the DNA coded output and end of shared secret key and the DNA coded output with
primers. DNA form of encrypted message (cipher text) Now the DNA coded output is converted to the original
which is also of 580 bits length: plain text by using the above table (cf. Table 1) which
results in “CAT”.
CGTAATTGTCTTGTCTCTCCAGAGGGCATTCGTAATTGTC
TTGTCTCTCCAGAGGGCATTCGTAATTGTCAACAGAGAG Vi. COMPARATIVE STUDY AND ANALYSIS
GAGAGGGCATTGCATTAACAGTTGTCTCTCCAGAGGGCA
TTGCATTAACAGAACAGAGAGGAGAGGGCATTCGTAATT In the modern era of DNA computing, there are various
GTCTTGTCTCTCCAGAGGGCATTGCATTAACAGAACAGA
encryption scheme proposed using different DNA
GAGGTCTCCCGTAACGTAATTGTCAACAGAGAGGTCTCC
technology like DNA digital coding, PCR primers, DNA
synthesis, DNA hybridization etc. Among different
CGTAAGCATTAACAGTTGTCTCTCCTCTCCCGTAAGCATT
encryption scheme a popular scheme was proposed by
AACAGTTGTCTCTCCTCTCCCGTAAGCATTAACAGAACA
Guangzhao Cui[18], An asymmetric cryptosystem where a
GAGAGGAGAGGGCATTCGTAATTGTCAACAGAGAGGTCT
plain text is converted to DNA template where primers were
CCCGTAACGTAATTGTCAACAGAGAGGTCTCCCGTAACG
used as key to encode and decode the message [18]. But,
TAATTGTCTTGTCTCTCCAGAGGGCATTGCATTAACAGAA
DNA encryption with PCR may not be always safe due to
CAGAGAGGTCTCCCGTAACGTAATTGTCTTGTCTCTCCAG the reason that:
AGGGCATTGCATTAACAGAACAGAGAGGTCTCCCGTAAC
GTAATTGTCTTGTCTCTCCAGAGGGCATTCGTAATTGTCA • The relationship between the original plaintext and
ACAGAGAGGTCTCCCGTAAGCATTAACAG. the converted DNA sequence is one-to-one thus the
statistical properties of plain text are in build in the
The above cipher text is transferred to the receiver through a cipher text. So, it is possible for an intruder to
channel. Now, after receiving the above cipher text receiver attack the cryptosystem through statistical attack
will also do the DNA hybridization of the cipher text with which lead to a security risk breaking the first level
the shared secret key. The corresponded result of sequence of security in the system.
which is also of 580 bits length:
Another Author Shreyas Chavan [19] has proposed an
GCATTAACAGAACAGAGAGGTCTCCCGTAAGCATTAACA encryption scheme using DNA Hybridization with one time
GAACAGAGAGGTCTCCCGTAAGCATTAACAGTTGTCTCT pad scheme. In this scheme, random ssDNA and random
CCTCTCCCGTAACGTAATTGTCAACAGAGAGGTCTCCCG OTP key are generated and get hybridized to create the
TAACGTAATTGTCTTGTCTCTCCTCTCCCGTAAGCATTAA cipher text. Though this algorithm is scalable, but there can
CAGAACAGAGAGGTCTCCCGTAACGTAATTGTCTTGTCT be a chance for the intruder to break the security due to the
CTCCAGAGGGCATTGCATTAACAGTTGTCTCTCCAGAGG following reasons:
GCATTCGTAATTGTCAACAGAGAGGAGAGGGCATTCGTA
ATTGTCAACAGAGAGGAGAGGGCATTCGTAATTGTCTTG • The cryptosystem is based on only traditional
TCTCTCCTCTCCCGTAAGCATTAACAGTTGTCTCTCCAGA binary DNA encoding scheme to convert the plain
GGGCATTGCATTAACAGTTGTCTCTCCAGAGGGCATTGC text into a DNA sequence.
ATTAACAGAACAGAGAGGTCTCCCGTAACGTAATTGTCT
TGTCTCTCCAGAGGGCATTGCATTAACAGAACAGAGAGG • There is a chance of a man-in-middle attack where
TCTCCCGTAACGTAATTGTCTTGTCTCTCCAGAGGGCATT an intruder can get the access of generating random
GCATTAACAGAACAGAGAGGTCTCCCGTAAGCATTAACA OTP keys. Also, with respect to the security
GTTGTCTCTCCAGAGGGCATTCGTAATTGTC. aspects reusing of the same random key for
multiple functions in the cryptosystem can open up
The receiver will convert the DNA sequence to binary security holes which lead to chosen protocol attack
sequence of length of 58 bits using the above table (cf. in which an intruder may implement a fresh
protocol using the same key as a targeted protocol
Table 2):
which is very strong individually [20].
110110100010000110001101011011000101101110001110
0011101010.
Our Security Features:
After converting this binary sequence to DNA sequence the In the modern era, every possible type of security risk
result will be DNA coded output with primers: should be considered effective. It should be considered that
GTCCACATCAGTTCGATTCGCAGCAGCCC. an intruder knows the basic DNA technology that the
designers can use and they may have also good knowledge
Now, receiver will have to remove the forward as well as as well as modern experimental devices to follow the
the end primer to get the original DNA coded output.. So, proposed encryption method. So, whatever the advanced
DNA technology used, it still has a great security risk. One
the original DNA coded output: GTTCGATTC.
F
Figure 2: The model of the proposed crypto system

Figure 3: key generation


g procedure using Diffie-Hellman key sharing Technique
.

solution can be found in the key generation as


a well as key An efficient crypto system should have enough key size for
sharing procedure. In this proposeed symmetric ensuring its safety. The tradditional encryption PCR method
cryptosystem, the actual key for encryption as well as of encrypted DNA sequencees have a problem where it does
description is not getting transmitted oveer the channel. not have enough key space s require for a secure
Rather, we have used Diffie-Hellman key shharing technique cryptosystem. In our proposed method, Diffie-Hellman key
to compute the shared secret key on the bothh side sender and sharing technique will solve this problem by having a large
receiver by only exchanging public key of eaach other. The prime number with larger size s of sender’s and receiver’s
size of the key is one of the great importannt factor for the private key.
security of the crypto system.
The security of the proposed cryptosystem have two levels:
The first level is biological information security and
complexity of the biologically inspired difficult (DNA
hybridization) problems. The attackers can not predict
the main cipher text as it contains extra information as ACKNOWLEDGMENT
forward primer and end primer. The intruders should have
to know both the primers, otherwise DNA hybridization will The authors are thankful to the professors whose direct or
fail to give the correct cipher text. If then also, they get indirect guidance help to present this paper successfully.
access of the primers, then also the security of the crypto
system will be remain intact. The second level security is REFERENCES
modular arithmetic problem of Diffie-Hellman key sharing
technique. Without getting the receiver’s private key, it is [1] Adleman, L. M. (1994). Molecular computation of solutions to
not possible for an intruder to calculate the shared secret key combinatorial problems. Science-AAAS-Weekly Paper Edition, 266(5187),
1021-1023.
as well as without the receiver’s key also the intruder should [2] Clelland, C. T., Risca, V., & Bancroft, C. (1999). Hiding messages in
have to do a large difficult calculation to break the security DNA microdots. Nature, 399(6736), 533-534.
of the proposed crypto system. Thus this crypto system is [3] Watson, J. D., & Crick, F. H. C. (1953). A structure for deoxyribose
highly secure because of the difficulties in biological issues nucleic acid. Nature, 421(6921), 397-3988.
[4] Lipton, R. J. (1995). DNA solution of hard computational problems.
and computation of shared secret key difficulties added a Science, 268(5210), 542-545.
double security level for the system. [5] Lipton, R. J. (1996). Breaking DBS Using a Molecular Computer Dan
Boneh Christopher Dimworth. DNA based computers, 27, 37.
Vii. CONCLUSION AND FUTURE WORK [6] Cui, G. Z., Liu, Y., & Zhang, X. (2006). New direction of data
storage: DNA molecular storage technology. Computer Engineering and
Applications, 42(26), 29-32.
The proposed algorithm can be a new approach in
symmetric key cryptography, where shared secret key is [7] Cox, J. P. (2001). Long-term data storage in DNA. TRENDS in
Biotechnology, 19(7), 247-250.
generated using Diffie-Hellman key sharing technique. The [8] Amos, M., Păun, G., Rozenberg, G., & Salomaa, A. (2002). Topics in
generation of shared secret key is highest level of security the theory of DNA computing. Theoretical computer science, 287(1), 3-38.
for the intruders to break the crypto system. Also different [9] Xiao, G., Lu, M., Qin, L., & Lai, X. (2006). New field of cryptography:
DNA technologies like DNA coding scheme (cf. Table 1), DNA cryptography. Chinese Science Bulletin, 51(12), 1413-1420.
DNA Hybridization is used with this crypto system. The [10] Kartalopoulos, S. V. (2005, October). DNA-inspired cryptographic
algorithm is more reliable, scalable and also gives robust method in optical communications, authentication and data mimicking. In
Military Communications Conference, 2005. MILCOM 2005. IEEE (pp.
performance. Extra information with the cipher text 774-779). IEEE.
provides more security to the algorithm. However, the [11] Cui, G., Qin, L., Wang, Y., & Zhang, X. (2007, April). Information
manipulation of DNA sequences takes a lot of time to work security technology based on DNA computing. In Anti-counterfeiting,
with DNA sequences as compared to time taken by many Security, Identification, 2007 IEEE International Workshop on (pp. 288-
291). IEEE.
very efficient algorithms of traditional cryptography such [12] Leier, A., Richter, C., Banzhaf, W., & Rauhe, H. (2000).
as, DES, RSA etc. [21], [22]. Still, it can face the problem Cryptography with DNA binary strands. BioSystems, 57(1), 13-22.
of huge computing time and high computational complexity. [13] Lu, M., Lai, X., Xiao, G., & Qin, L. (2007). Symmetric-key
cryptosystem with DNA technology. Science in China Series F:
Information Sciences, 50(3), 324-333.
[14] Gehani, A., LaBean, T., & Reif, J. (2004). DNA-based cryptography.
In future, the proposed crypto system can be used for the In Aspects of Molecular Computing (pp. 167-188). Springer Berlin
real time security of the distributed networking system. It Heidelberg.
can be enhanced with much more advanced topics like [15] Tanaka, K., Okamoto, A., & Saito, I. (2005). Public-key system using
DNA as a one-way function for key distribution. Biosystems, 81(1), 25-29.
realization of many security technologies available for [16] Clelland, C. T., Risca, V., & Bancroft, C. (1999). Hiding messages in
encryption, signature, steganography, and authentication. DNA microdots. Nature, 399(6736), 533-534.
The hardware implementation can be easy for this simple [17] "Diffie Hellman Key Exchange - A Non-Mathematician's
crypto system and it can be very efficient. Multiple rounds Explanation," ISSA Journal, p. 7, 2006.
[18] Cui, G., Qin, L., Wang, Y., & Zhang, X. (2008, September). An
can also be implemented easily with the advanced hardware encryption scheme using DNA technology. In Bio-Inspired Computing:
technology. So, this crypto system is suitable for both Theories and Applications, 2008. BICTA 2008. 3rd International
hardware as well as software implementation. But, Diffie- Conference on (pp. 37-42). IEEE.
Hellman key exchange algorithm can be trapped by man-in- [19] Shreyas Chavan(2013). DNA Cryptography Based on DNA
Hybridization and One Time pad scheme. International Journal of
middle attack in a situation where the communicators will Engineering Research & Technology (IJERT). Vol. 2 Issue 10.
believe that they are talking to each other but they are [20] Kelsey, J., Schneier, B., & Wagner, D. (1998, January). Protocol
actually not. This can be prevented if both the sender as interactions and the chosen protocol attack. In Security Protocols (pp. 91-
well as the receiver can be authenticated by each other 104). Springer Berlin Heidelberg.
[21] Beaver, D. (1995). Factoring: the DNA solution. In Advances in
before beginning to exchange information. Cryptology—ASIACRYPT'94 (pp. 419-423). Springer Berlin Heidelberg.
[22] Brun, Y. (2007). Arithmetic computation in the tile assembly model:
Addition and multiplication. Theoretical Computer Science, 378(1), 17-31.

You might also like