Unlike conventional computers, quantum computers utilize the quantum properties, such as superposition and entanglement, to enable multiplication operations and parallel calculations. Recently, as the development of quantum computer-related technologi...
Unlike conventional computers, quantum computers utilize the quantum properties, such as superposition and entanglement, to enable multiplication operations and parallel calculations. Recently, as the development of quantum computer-related technologies has rapidly progressed, the rise of the commercialization of quantum computer technology would come soon. Due to the groundbreaking technological advancements in quantum computers, computer power has increased exponentially. Thus, it is unsurprising that the security system of the existing silicon-based encryption system, which maintains security by using massive computational power, will have limitations in exercising its function. It is expected that storing personal sensitive information in silicon based security systems that have been widely applied recently will not be capable to appropriately perform their original functions and roles in the future. To overcome these limitations, I seek to solve the problem by storing information in a material-based system.
Material-based computers developed until recently have various forms, but in each case, there are numerous problems, such as carryover problems, long input preparation time, and reaction time that are difficult to put into practical use. To complement this, this study seeks to utilize a bio half adder that combines AND using a transaminase reaction and XOR using an alcohol dehydrogenase equilibrium reaction, and to utilize a decoding algorithm that solves the carryover problem. In this study, the biocatalytic reactions time required for the operation of the bio half adder system in previous studies became shortened to 2 minutes for practical use from 20 minutes.
In addition, I plan to use an improved bio half adder system to encrypt and decrypt information requiring security. To operate the encryption system, first, the sender converts the information to encrypt into plaintext expressed in binary numbers, using American Standard Code for Information Interchange (ASCII) code. Next, the sender obtains cypher text, through the encryption step of adding LOCK, a 96-bit binary number determined by several rules, to the plaintext expressed in binary numbers. The sender displays the cypher text in Input A, a chemical solution, on a 96 well micro plate and delivers it to the receiver. The receiver sends the cypher text displayed on the delivered micro plate to the half corresponding to the KEY that can remove the lock through an overflow phenomenon. By adding through adder, plaintext expressed in binary number, and the final information could be obtained through ASCII again, leading to a binary plaintext.
On the other hand, when a third party attempts to hack and analyze the cypher text, the brute force attack is usually used in which all combinations are substituted for hacking. There are 296 possible ways, which is 100,000 times more than Avogadro's number. When using the bio-encryption system, it takes about 26 billion years, which is longer than the current estimated age of the universe, which is 14 billion years. Thus, it is impossible to decipher it without KEY information.
In addition, to prevent decryption using other methods after reading the binary number corresponding to the cypher text, a double cypher using the chiral pollution concept was additionally applied. This is because (R)-α-Methylbenzylamine (MBA) and NAD+, which are components of Input A used to indicate 1 in the binary cypher text, show higher absorbance at a specific wavelength compared to triple distilled water (TDW), which is the 0 in the cypher text, making the cypher text easy to read in the UV-Vis spectrum, which legibility has been a drawback.
Chiral pollution is a concept that utilizes the property that ω-transaminase from Arthrobacter species, used in bio half adder, reacts selectively only with (R)-α-MBA and does not react with (S)-α-MBA, and that (R)-α-MBA and (S)-α-MBA show the same absorbance irrespective of wavelength due to the same physicochemical properties except for chirality. To obtain the same absorbance of Input A, which is used to display 1 in the cypher text, and Input A`, which is used instead of TDW to display 0, (S)-α-MBA and NAD+ were used instead of (R)-α-MBA, NAD+, and ethanol, which are the chemicals used in Input A. As a result of applying the chemical replacement, both the output of the AND, XOR gate obtained using Input A, TDW and the output obtained using Input A, Input A` are the same. At the same time, almost similar results were obtained for both the absorbance of Input A and Input A`. Therefore, by making it impossible to read 0, 1 of the cypher text using methods such as UV-Vis spectrum other than enzyme reaction, security was greatly strengthened.
Using the bio-encryption system obtained as the result of this study, messages, phrases, and personal genetic disease information requiring security were encrypted. Simultaneously, the security of the bio-encryption system was further strengthened by applying the complexification process using biocatalytic reactions to the chemically expressed cypher text and double cypher system of the cypher text using the chiral pollution. In the future, computing power will increase exponentially due to quantum computers, and security can be maintained by using the natural phenomenon of limited diffusion speed based on material-based enzyme reactions, including sensitive information such as personal genetic information. It will be widely used in fields that require thorough security, such as wills.