International Journal of Information Management 32 (2012) 175–181 Contents lists available at SciVerse ScienceDirect International Journal of Information Management j our nal ho me p age: www.elsevier.com/locate/ijinfomgt DNA-like linguistic secret sharing for strategic information systems Marek R. Ogiela , Urszula Ogiela AGH University of Science and Technology, Al. Mickiewicza 30, PL-30-059 Krakow, Poland a r t i c l e i n f o Article history: Available online 20 December 2011 Keywords: Information management Secret sharing protocols Mathematical linguistics a b s t r a c t The development of DNA cryptography has contributed to the ability of solving many computation- ally difficult problems by offering the capability of executing calculations in parallel. This capability is used particularly in solving NP-complete problems or implementing cryptography and steganography solutions. Biological computation models based on bonds between nitrogen bases in nucleic acid chains that make up DNA structures can also be used to develop new solutions for smart information manage- ment. This study discusses new secret splitting techniques based on mathematical linguistic methods and designed for intelligently managing secret data within hierarchical structures. These techniques make use of information coding models found in the coding of DNA sequences. © 2011 Elsevier Ltd. All rights reserved. 1. Introduction The development of artificial intelligence techniques has sig- nificantly improved the capability of solving a number of difficult problems using advanced algorithms and methods inspired by biological models. One such interesting subject is the intelligent management of important or classified data that is held by various companies, corporations, institutions or organizations. The method of classifying this data as well as ensuring its integrity and authen- ticity has represented and still represents the fundamental issue connected with managing such data (ElGamal, 1985; Menezes, van Oorschot, & Vanstone, 2001). In modern computer systems and also in advanced management models, these characteristics can be achieved by using sophisticated cryptographic methods and proto- cols. Although these techniques are secure (unbreakable) from the point of view of the information theory and the complexity theory, their application is often limited to the narrow field of confiden- tial data distribution within a small group of users. Yet in wide management structures, it may be necessary to set up many inde- pendent levels of management of specific data, split depending on the access rights to this data of persons who will hold it. This can be achieved by the independent application of cryptographic meth- ods of threshold splitting of information, introduced by Shamir and Blakley in late 1970s (Adleman, 1994; Shamir, 1979). Threshold information splitting techniques have many advantages and can be applied to any type of data stored in the digital form (images, sound, text, etc.). Yet they are also subject to certain limitations Corresponding author. Tel.: +48 12 617 38 54; fax: +48 12 634 15 68. E-mail address: mogiela@agh.edu.pl (M.R. Ogiela). due mainly to the fact that in the majority of cases these methods generate equal shadows or shares of the information. What such procedures cannot guarantee is the selective access to the shared data, based on access rights which may differ depending on the level of authority or privilege of the participant of the given protocol. So in order to create such hierarchical access in which every level will have different access rights and abilities to recreate the split secret, it is necessary to enhance the known methods of threshold splitting of information so that they would support varied splits depending on the position in the management structure. This study proposes a method for developing new solutions in this field, referred to as lin- guistic threshold schemes. They make use of traditional procedures of threshold splitting of secrets enhanced with an additional stage at which information is coded using context-free formal grammars. Such linguistic formalisms make it possible to re-code the shared secret and create its new linguistic presentation, which then under- goes the splitting procedure. The grammar introduced makes it possible to create various representations depending on the level in the management structure and the access rights of the people involved in the information splitting and reconstruction protocol. The method of recoding the original data into a new linguistic rep- resentation is based on converting bit blocks of various lengths. The parameter determining the data block size can be changed depend- ing on the level of the hierarchical structure at which the secret is split. The method itself of recoding bit values of the secret into a new linguistic representation makes use of solutions found in DNA cryptography, in which the encrypted data can be stored in the form of sequences of nucleotides (nitrogen bases) or the bonds between them (Gehani, LaBean, & Reif, 2000). Such information storage models allow single bits or their pairs to be coded by sub- sequent bases found in the DNA molecule chain. Lower down in the article the coding model used, based on the storage of information 0268-4012/$ see front matter © 2011 Elsevier Ltd. All rights reserved. doi:10.1016/j.ijinfomgt.2011.11.016