Preprint / Version 1

Encryption Algorithms for the Bioinformatics Data


Data Security, Encryption, Cryfa Tools, Forward Algorithm, Biological Data


Lembar pernyataan
Yth Moderator RINarxiv
Bahwa saya menyatakan:
1) Sebagai penulis artikel berjudul "Encryption Algorithms for the Bioinformatics Data". Melalui surel ini saya menyatakan bahwa artikel ini berstatus (pilih salah satu):
A. Preprint yang telah dikirimkan ke Malaysian Journal of Applied Sciences

2) bahwa artikel ini bukan merupakan karya original. Seandainya di kemudian hari ditemukan ada unsur plagiarisme (sengaja atau tidak sengaja), maka itu adalah tanggung jawab saya dan tim penulis.
Muhammad Aldino Hafidzhah, Arli Aditya Parikesit
The security of the bioinformatics data is one area that is still overlooked by the cybersecurity community. There are several issues that should be catered accordingly, such as data privacy and restricted data access. Encryption algorithm might be the solution to solve this problem because it is the industry standard approach to the cybersecurity issues. That is why in this review we will try to find the most suitable and effective encryption algorithm that can be used to preserve security to biological data by doing some comparison using several parameters and methods accordingly. It is found that the Cryfa tool is one of the most promising applications for securing the bioinformatics data. Beside the tools, in this regard, artificial intelligence-based approach could leverage the security level significantly.



Bernard, S., & Parikesit, A. A. (2020). Artificial Intelligence in Colonoscopy: Improving Medical Diagnostic of Colorectal Cancer. Frontiers in Health Informatics, 9(1), 27.

Chen, C.-M., Jyan, H.-W., Chien, S.-C., Jen, H.-H., Hsu, C.-Y., Lee, P.-C., … Chan, C.-C. (2020). Containing COVID-19 among 627,386 Persons Contacting with Diamond Princess Cruise Ship Passengers Disembarked in Taiwan: Big Data Analytics. Journal of Medical Internet Research.

Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. ángel O., & Toval, A. (2013, June 1). Security and privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics. Academic Press.

Franz, M., Deiseroth, B., Hamacher, K., Jha, S., Katzenbeisser, S., & Schröder, H. (2012). Towards Secure Bioinformatics Services (Short Paper). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 276–283).

Hasan, M. Z., Mahdi, M. S. R., Sadat, M. N., & Mohammed, N. (2018). Secure count query on encrypted genomic data. Journal of Biomedical Informatics, 81, 41–52.

Hosseini, M., Pratas, D., & Pinho, A. J. (2019). Cryfa: a secure encryption tool for genomic data. Bioinformatics, 35(1), 146–148.

Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017, January 1). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care. IOS Press.

Kumari, S. (2017). A research Paper on Cryptography Encryption and Compression Techniques. International Journal Of Engineering And Computer Science.

Luxton, D. D., Kayl, R. A., & Mishkind, M. C. (2012). MHealth data security: The need for HIPAA-compliant standardization. Telemedicine and E-Health, 18(4), 284–288.

Morel, B. (2011). Artificial intelligence and key to the future of cybersecurity. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 93–97). New York, New York, USA: ACM Press.

Pratas, D., Hosseini, M., & Pinho, A. J. (2017). Cryfa: A Tool to Compact and Encrypt FASTA Files. In Advances in Intelligent Systems and Computing (pp. 305–312).

Rehman, S. (2016). Characterization of Advanced Encryption Standard (AES) for Textual and Image data. International Journal Of Engineering And Computer Science.

Yang Lou, X. (2017). Hidden Markov Model Approaches for Biological Studies. Biometrics & Biostatistics International Journal, 5(4).

Zarate, O. A., Brody, J. G., Brown, P., Ramirez-Andreotta, M. D., Perovich, L., & Matz, J. (2016). Balancing Benefits and Risks of Immortal Data: Participants’ Views of Open Consent in the Personal Genome Project. Hastings Center Report, 46(1), 36–45.

Zhou, X., & Tang, X. (2011). Research and implementation of RSA algorithm for encryption and decryption. In Proceedings of the 6th International Forum on Strategic Technology, IFOST 2011.