{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:33:44Z","timestamp":1773801224963,"version":"3.50.1"},"reference-count":12,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T00:00:00Z","timestamp":1531872000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"name":"European Fund for Regional Development"},{"name":"Operational Program Competitiveness Factors"},{"name":"Portuguese Foundation for Science and Technology","award":["UID\/CEC\/00127\/2013"],"award-info":[{"award-number":["UID\/CEC\/00127\/2013"]}]},{"name":"Portuguese Foundation for Science and Technology","award":["PTCD\/EEI-SII\/6608\/2014"],"award-info":[{"award-number":["PTCD\/EEI-SII\/6608\/2014"]}]},{"name":"Portuguese Foundation for Science and Technology","award":["PD\/BD\/113969\/2015"],"award-info":[{"award-number":["PD\/BD\/113969\/2015"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:sec>\n                  <jats:title>Summary<\/jats:title>\n                  <jats:p>The ever-increasing growth of high-throughput sequencing technologies has led to a great acceleration of medical and biological research and discovery. As these platforms advance, the amount of information for diverse genomes increases at unprecedented rates. Confidentiality, integrity and authenticity of such genomic information should be ensured due to its extremely sensitive nature. In this paper, we propose Cryfa, a fast secure encryption tool for genomic data, namely in Fasta, Fastq, VCF, SAM and BAM formats, which is also capable of reducing the storage size of Fasta and Fastq files. Cryfa uses advanced encryption standard (AES) encryption combined with a shuffling mechanism, which leads to a substantial enhancement of the security against low data complexity attacks. Compared to AES Crypt, a general-purpose encryption tool, Cryfa is an industry-oriented tool, which is able to provide confidentiality, integrity and authenticity of data at four times more speed; in addition, it can reduce the file sizes to 1\/3. Due to the absence of a method similar to Cryfa, we have simulated its behavior with a combination of encryption and compression tools, for comparison purpose. For instance, our tool is nine times faster than its fastest competitor in Fasta files. Also, Cryfa has a very low memory usage (only a few megabytes), which makes it feasible to run on any computer.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Availability and implementation<\/jats:title>\n                  <jats:p>Source codes and binaries are available, under GPLv3, at https:\/\/github.com\/pratas\/cryfa.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Supplementary information<\/jats:title>\n                  <jats:p>Supplementary data are available at Bioinformatics online.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1093\/bioinformatics\/bty645","type":"journal-article","created":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T17:05:03Z","timestamp":1531933503000},"page":"146-148","source":"Crossref","is-referenced-by-count":24,"title":["Cryfa: a secure encryption tool for genomic data"],"prefix":"10.1093","volume":"35","author":[{"given":"Morteza","family":"Hosseini","sequence":"first","affiliation":[]},{"given":"Diogo","family":"Pratas","sequence":"additional","affiliation":[]},{"given":"Armando J","family":"Pinho","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2018,7,18]]},"reference":[{"key":"2023013107203314900_bty645-B1","doi-asserted-by":"crossref","first-page":"7002","DOI":"10.1109\/TIT.2012.2207880","article-title":"Low-data complexity attacks on AES","volume":"58","author":"Bouillaguet","year":"2012","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2023013107203314900_bty645-B2","doi-asserted-by":"crossref","first-page":"38.","DOI":"10.1109\/MSP.2017.3681055","article-title":"Genomic security (lest we forget)","volume":"15","author":"Bradley","year":"2017","journal-title":"IEEE Security Privacy Mag"},{"key":"2023013107203314900_bty645-B3","doi-asserted-by":"crossref","first-page":"9.","DOI":"10.1186\/2041-2223-5-9","article-title":"Validation of high throughput sequencing and microbial forensics applications","volume":"5","author":"Budowle","year":"2014","journal-title":"Investig. Genet"},{"key":"2023013107203314900_bty645-B4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES\u2014the Advanced Encryption Standard","author":"Daemen","year":"2002"},{"key":"2023013107203314900_bty645-B5","doi-asserted-by":"crossref","first-page":"107.","DOI":"10.1038\/nchembio.2561","article-title":"Synthetic biology: license to kill","volume":"14","author":"Deane","year":"2018","journal-title":"Nat. Chem. Biol"},{"key":"2023013107203314900_bty645-B6","doi-asserted-by":"crossref","first-page":"3407","DOI":"10.1016\/j.cub.2016.10.061","article-title":"17th century variola virus reveals the recent history of smallpox","volume":"26","author":"Duggan","year":"2016","journal-title":"Curr. Biol"},{"key":"2023013107203314900_bty645-B7","doi-asserted-by":"crossref","first-page":"20.","DOI":"10.1038\/s41590-017-0007-9","article-title":"Emerging viral diseases from a vaccinology perspective: preparing for the next pandemic","volume":"19","author":"Graham","year":"2018","journal-title":"Nature Immunol"},{"key":"2023013107203314900_bty645-B8","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1126\/science.aam9710","article-title":"Deriving genomic diagnoses without revealing patient genomes","volume":"357","author":"Jagadeesh","year":"2017","journal-title":"Science"},{"key":"2023013107203314900_bty645-B9","doi-asserted-by":"crossref","first-page":"46.","DOI":"10.1038\/nbt.4017","article-title":"Precision oncology in the age of integrative genomics","volume":"36","author":"Kumar-Sinha","year":"2018","journal-title":"Nature Biotechnol"},{"key":"2023013107203314900_bty645-B10","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.epsl.2008.03.026","article-title":"Extraterrestrial nucleobases in the murchison meteorite","volume":"270","author":"Martins","year":"2008","journal-title":"Earth Planet. Sci. Lett"},{"key":"2023013107203314900_bty645-B11","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1111\/mec.14478","article-title":"Scaling up: a guide to high throughput genomic approaches for biodiversity analysis","volume":"27","author":"Porter","year":"2018","journal-title":"Mol. Ecol"},{"key":"2023013107203314900_bty645-B12","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.ins.2017.11.021","article-title":"Improved known-plaintext attack to permutation-only multimedia ciphers","volume":"430\u2013431","author":"Zhang","year":"2018","journal-title":"Inf. Sci"}],"container-title":["Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/35\/1\/146\/48962236\/bioinformatics_35_1_146.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/35\/1\/146\/48962236\/bioinformatics_35_1_146.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T10:00:09Z","timestamp":1675159209000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article\/35\/1\/146\/5055587"}},"subtitle":[],"editor":[{"given":"Bonnie","family":"Berger","sequence":"additional","affiliation":[{"name":"IEETA, Department of Electronics, Telecommunications and Informatics, University of Aveiro, Aveiro, Portugal"}]}],"short-title":[],"issued":{"date-parts":[[2018,7,18]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1,1]]}},"URL":"https:\/\/doi.org\/10.1093\/bioinformatics\/bty645","relation":{},"ISSN":["1367-4803","1367-4811"],"issn-type":[{"value":"1367-4803","type":"print"},{"value":"1367-4811","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2019,1,1]]},"published":{"date-parts":[[2018,7,18]]}}}