Information Security-Based Nano- and Bio-Cryptography

Information Security-Based Nano- and Bio-Cryptography

W. K. Hamoudi (University of Technology, Iraq) and Nadia M. G. Al-Saidi (University of Technology, Iraq)
DOI: 10.4018/978-1-4666-5808-0.ch007
OnDemand PDF Download:


Information security can provide confidentiality, integrity, and availability for society to benefit efficiently from data storage and open networks. Free space communication networks suffer from adversaries who interfere with data on networked computers. Inventing new protection techniques has arisen to ensure integrity and authenticity of digital information. This chapter introduces Nano and Bio techniques in cryptography to enhance the information security systems. Tasks unfeasible on a classical computer can now be performed by quantum computers, yielding a big impact on online security. Threats of exponentially fast quantum algorithms on business transactions could be overcome by this new technology. Based on biological observations, the exploration of biometric cryptography and authentication to determine individuals' authenticity can be done through numeric measurements. This provides very reliable automated verification and strong protection against biometric system attacks.
Chapter Preview


There is an increasing need for a multidisciplinary, the system-oriented approach to manufacturing Micro/Nano-devices that function reliably (Bharat, 2007). This can be achieved through the intermixing of ideas from different disciplines and the systematic flow of information (Ahmad, Amri, Zuriati & Elissa, 2009). Cryptography is the science of protecting the privacy of information during communication under hostile conditions. With this information era that is full of various information and knowledge, and the increasing use of digital devices, many applications such as, electronic mail, electronic fund transfer, classified files, etc., are easily transmitted and suitable for communicating over the insecure communication channels. However, the security and authentication is still a challenging problem, and there is always a growing demand of cryptographic techniques, which has spurred a great deal of intensive research activities in the study of cryptography (Ganesan, Ishan, & Mansi 2008).

Quantum key distribution (QKD) is a very advanced encryption method of Quantum Cryptography (QC) for distributing a secret key. It allows the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. QKD can be used in conjunction with existing network services for businesses communication services when a higher degree of confidentiality and protection are needed. Practical realization of QKD technology relies on availability of systems providing production, propagation, and detection of single photons. Single photon sources based on; Nano quantum dots, carbon nanotubes and diamond nanowires have enabled the development and recent demonstration of a number of commercial products.

Bio-cryptography is an emerging multidiscipline technology which combines biometrics with cryptography. It inherits the advantages of both and provides strong means to protect against biometric system attacks. Biometric is the science or technology which analyzes and measure the biological data. It is first used for recognition and identification, while it is used now for automatic identification and authentication. The characteristic features of the individual’s is stored in a database using input devices, which then compared with the features extracted from the traits of the individual need to be identified. This type of schemes provides an essential security requirement. The biometric data have many advantages over traditional systems, they cannot be guessed, forgotten, stolen or lost. There is nothing to remember or carry, and are more users friendly, where their efficiency makes it easily to be applied alone or hybrid with other security and authentication methods (Al-Saidi, Said & Othman, 2012). Authentication is the first step of information security. It refers to the process used to identify and confirm the validity of the user. It is a mechanism used to authenticate user identity over insecure communication network. Traditional alphanumeric passwords are widely used for authentication. They have memorability problem for secure passwords and their security is based on the password only. It is always threatened due to the availability of simple, rapid and perfect duplication and distribution means using simple dictionary attacks.

The material of this chapter is arranged into 6 sections, and as follows:

  • 1.


  • 2.

    Nano and bio-assemblies.

  • 3.

    Cryptography and Information security.

  • 4.

    Nano-technology applications in information systems.

  • 5.

    Quantum dots in cryptography.

  • 6.

    Authentication based on Nano and Biometric techniques.

  • 7.

    Nano and Bio in cryptanalysis (from Bio to Nano: how to defeat attacks).

  • 8.


Complete Chapter List

Search this Book: