(56 intermediate revisions by 6 users not shown) | |||
Line 10: | Line 10: | ||
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-background-layer-bottom&action=raw&ctype=text/css" rel="stylesheet" type="text/css"> | <link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-background-layer-bottom&action=raw&ctype=text/css" rel="stylesheet" type="text/css"> | ||
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-background-banner&action=raw&ctype=text/css" rel="stylesheet" type="text/css"> | <link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-background-banner&action=raw&ctype=text/css" rel="stylesheet" type="text/css"> | ||
− | |||
<style> | <style> | ||
− | + | table { | |
+ | border: 0px!important; | ||
+ | } | ||
+ | td { | ||
+ | border: 0px!important; | ||
+ | } | ||
#top_title, #sideMenu{ | #top_title, #sideMenu{ | ||
display: none; | display: none; | ||
− | } | + | } |
div #content { | div #content { | ||
Line 24: | Line 28: | ||
} | } | ||
+ | #menu li ul li:hover ul{ | ||
+ | background:rgba(0,0,0,0.75)!important; | ||
+ | } | ||
+ | li#mainlevel_01 a { | ||
+ | color: #FFE5B5!important; | ||
+ | |||
+ | } | ||
+ | li#mainlevel_01 a:hover { | ||
+ | font-size:30px!important; | ||
+ | text-shadow:0px 0px 8px #FFE5B5, | ||
+ | 0px 0px 42px #FFE5B5, | ||
+ | 0px 0px 72px #FFE5B5, | ||
+ | 0px 0px 150px #FFE5B5; | ||
+ | } | ||
+ | li#mainlevel_02 a { | ||
+ | color: #FFE5B5!important; | ||
+ | } | ||
+ | li#mainlevel_02 a:hover { | ||
+ | font-size:30px!important; | ||
+ | text-shadow:0px 0px 8px #FFE5B5, | ||
+ | 0px 0px 42px #FFE5B5, | ||
+ | 0px 0px 72px #FFE5B5, | ||
+ | 0px 0px 150px #FFE5B5; | ||
+ | } | ||
+ | li#mainlevel_03 a { | ||
+ | color: #FFE5B5!important; | ||
+ | } | ||
+ | li#mainlevel_03 a:hover { | ||
+ | font-size:30px!important; | ||
+ | text-shadow:0px 0px 8px #FFE5B5, | ||
+ | 0px 0px 42px #FFE5B5, | ||
+ | 0px 0px 72px #FFE5B5, | ||
+ | 0px 0px 150px #FFE5B5; | ||
+ | } | ||
+ | li#mainlevel_05 a { | ||
+ | color: #FFE5B5!important; | ||
+ | } | ||
+ | li#mainlevel_05 a:hover { | ||
+ | font-size:30px!important; | ||
+ | text-shadow:0px 0px 8px #FFE5B5, | ||
+ | 0px 0px 42px #FFE5B5, | ||
+ | 0px 0px 72px #FFE5B5, | ||
+ | 0px 0px 150px #FFE5B5; | ||
+ | } | ||
+ | li#mainlevel_06 a { | ||
+ | color: #FFE5B5!important; | ||
+ | } | ||
+ | li#mainlevel_06 a:hover { | ||
+ | font-size:30px!important; | ||
+ | text-shadow:0px 0px 8px #FFE5B5, | ||
+ | 0px 0px 42px #FFE5B5, | ||
+ | 0px 0px 72px #FFE5B5, | ||
+ | 0px 0px 150px #FFE5B5; | ||
+ | } | ||
+ | li#mainlevel_07 a { | ||
+ | color: #FFE5B5!important; | ||
+ | } | ||
+ | li#mainlevel_07 a:hover { | ||
+ | font-size:30px!important; | ||
+ | text-shadow:0px 0px 8px #FFE5B5, | ||
+ | 0px 0px 42px #FFE5B5, | ||
+ | 0px 0px 72px #FFE5B5, | ||
+ | 0px 0px 150px #FFE5B5; | ||
+ | } | ||
+ | li#mainlevel_08 a { | ||
+ | color: #FFE5B5!important; | ||
+ | } | ||
+ | li#mainlevel_08 a:hover { | ||
+ | font-size:30px!important; | ||
+ | text-shadow:0px 0px 8px #FFE5B5, | ||
+ | 0px 0px 42px #FFE5B5, | ||
+ | 0px 0px 72px #FFE5B5, | ||
+ | 0px 0px 150px #FFE5B5; | ||
+ | } | ||
+ | #menu li ul li ul li a:hover { | ||
+ | color: rgba(0,223,252,1); | ||
+ | border-top: dotted 1px rgba(255,255,255,0.91); | ||
+ | border-bottom: dotted 1px rgba(255,255,255,0.91); | ||
+ | background: rgba(0,223,252,.02); | ||
+ | } | ||
+ | #nav .mainlevel a { | ||
+ | color: black; | ||
+ | text-decoration:none; | ||
+ | line-height:32px; | ||
+ | display:block; | ||
+ | padding:0 5px; | ||
+ | font-size: 25px!important; | ||
+ | font-family: 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji' !important; | ||
+ | } | ||
+ | .layer-bottom { | ||
+ | z-index: -2; | ||
+ | position: absolute; | ||
+ | margin-top: 36px!important; | ||
+ | } | ||
+ | #table1,#table2,#table3,#table4,#table5,#table6,#table7 {background-color: transparent!important;} | ||
+ | |||
+ | #table1 tr { | ||
+ | background-color: transparent!important; | ||
+ | } | ||
+ | |||
+ | #table1 td { | ||
+ | vertical-align: top; | ||
+ | } | ||
+ | #table2 td { | ||
+ | vertical-align: top; | ||
+ | } | ||
+ | #table3 td { | ||
+ | vertical-align: top; | ||
+ | } | ||
+ | #table4 td { | ||
+ | vertical-align: top; | ||
+ | } | ||
+ | #table5 td { | ||
+ | vertical-align: top; | ||
+ | } | ||
+ | #table6 td { | ||
+ | vertical-align: top; | ||
+ | } | ||
+ | #table7 td { | ||
+ | |||
+ | |||
+ | vertical-align: top; | ||
+ | } | ||
</style> | </style> | ||
Line 29: | Line 156: | ||
<body> | <body> | ||
<!--menu--> | <!--menu--> | ||
− | <div id="menu"> | + | |
− | <li id="nav">           | + | <div id="menu" style="background-color:rgba(0,0,0,0.6)!important"> |
+ | <li id="nav" style="left: 8%!important; width: 100%!important;">           | ||
<ul class="firstmenu" style="float: left"> | <ul class="firstmenu" style="float: left"> | ||
Line 42: | Line 170: | ||
<ul id="sub_02"> | <ul id="sub_02"> | ||
<li><a href="https://2018.igem.org/Team:NEFU_China/Background" target="_self">BACKGROUND</a></li> | <li><a href="https://2018.igem.org/Team:NEFU_China/Background" target="_self">BACKGROUND</a></li> | ||
− | <li><a href="https://2018.igem.org/Team:NEFU_China/Description" target="_self">DESCRIPTION | + | <li><a href="https://2018.igem.org/Team:NEFU_China/Description" target="_self">DESCRIPTION & DESIGN</a></li> |
− | + | <li><a href="https://2018.igem.org/Team:NEFU_China/Coding book" target="_self">CODE BOOK</a></li> | |
− | <li><a href="https://2018.igem.org/Team:NEFU_China/Coding book" target="_self"> | + | |
</ul> | </ul> | ||
</li> | </li> | ||
− | + | <li class="mainlevel" id="mainlevel_03"> | |
− | <a href="https://2018.igem.org/Team:NEFU_China/ | + | <a href="https://2018.igem.org/Team:NEFU_China/Demonstrate"><img id="parts" src="https://static.igem.org/mediawiki/2018/6/62/T--NEFU_China--_RESULTS.png">EXPERIMENTS</a> |
<ul id="sub_03"> | <ul id="sub_03"> | ||
− | <li><a href="https://2018.igem.org/Team:NEFU_China/ | + | <li><a href="https://2018.igem.org/Team:NEFU_China/Lock_Key" target="_self">LOCK & KEY</a></li> |
− | <li><a href="https://2018.igem.org/Team:NEFU_China/ | + | <li><a href="https://2018.igem.org/Team:NEFU_China/Suicide" target="_self">INFORMATION DESTRUCTION</a></li> |
+ | <li><a href="https://2018.igem.org/Team:NEFU_China/Splicing" target="_self">Pre-RNA SPLICING</a></li> | ||
+ | <li><a href="https://2018.igem.org/Team:NEFU_China/Demonstrate" target="_self">DEMONSTRATE</a></li> | ||
+ | <hr> | ||
+ | <li><a href="https://2018.igem.org/Team:NEFU_China/Basic_Part" target="_self">BASIC PARTS</a></li> | ||
+ | <li><a href="https://2018.igem.org/Team:NEFU_China/Composite_Part" target="_self">COMPOSITE PARTS</a></li> | ||
<li><a href="https://2018.igem.org/Team:NEFU_China/Improve" target="_self">IMPROVEMENT PARTS</a></li> | <li><a href="https://2018.igem.org/Team:NEFU_China/Improve" target="_self">IMPROVEMENT PARTS</a></li> | ||
− | <li><a href="https://2018.igem.org/Team:NEFU_China/ | + | <li><a href="https://2018.igem.org/Team:NEFU_China/Part_Collection" target="_self">PARTS COLLECTION</a></li> |
− | + | <hr> | |
− | + | <li><a href="https://2018.igem.org/Team:NEFU_China/Notebook" target="_self">NOTEBOOK</a></li> | |
− | + | <li><a href="https://2018.igem.org/Team:NEFU_China/Protocol" target="_self">PROTOCOL</a></li> | |
− | + | ||
− | + | ||
− | < | + | |
− | <li><a href="https://2018.igem.org/Team:NEFU_China/ | + | |
− | <li><a href="https://2018.igem.org/Team:NEFU_China/ | + | |
</ul> | </ul> | ||
</li> | </li> | ||
+ | |||
<li class="mainlevel" id="mainlevel_05"> | <li class="mainlevel" id="mainlevel_05"> | ||
<a href="https://2018.igem.org/Team:NEFU_China/Model"><img id="model" src="https://static.igem.org/mediawiki/2018/0/0c/T--NEFU_China--_MODEL.png">MODEL</a> | <a href="https://2018.igem.org/Team:NEFU_China/Model"><img id="model" src="https://static.igem.org/mediawiki/2018/0/0c/T--NEFU_China--_MODEL.png">MODEL</a> | ||
<ul id="sub_05"> | <ul id="sub_05"> | ||
<li><a href="https://2018.igem.org/Team:NEFU_China/Model" target="_self">OVERVIEW</a></li> | <li><a href="https://2018.igem.org/Team:NEFU_China/Model" target="_self">OVERVIEW</a></li> | ||
− | <li><a href="https://2018.igem.org/Team:NEFU_China/Model1" target="_self"> | + | <li><a href="https://2018.igem.org/Team:NEFU_China/Model1" target="_self">CORRESPONDING COEFFICIENT</a></li> |
− | <li><a href="https://2018.igem.org/Team:NEFU_China/Model2" target="_self"> | + | <li><a href="https://2018.igem.org/Team:NEFU_China/Model2" target="_self">KILLING MODEL</a></li> |
</ul> | </ul> | ||
</li> | </li> | ||
Line 76: | Line 204: | ||
<ul id="sub_06"> | <ul id="sub_06"> | ||
<li><a href="https://2018.igem.org/Team:NEFU_China/Software" target="_self">OVERVIEW</a></li> | <li><a href="https://2018.igem.org/Team:NEFU_China/Software" target="_self">OVERVIEW</a></li> | ||
− | <li><a href="https://2018.igem.org/Team:NEFU_China/Software1" target="_self"> | + | <li><a href="https://2018.igem.org/Team:NEFU_China/Software1" target="_self">CODING</a></li> |
− | <li><a href="https://2018.igem.org/Team:NEFU_China/Software2" target="_self"> | + | <li><a href="https://2018.igem.org/Team:NEFU_China/Software2" target="_self">MISLEADING</a></li> |
+ | <li><a href="https://2018.igem.org/Team:NEFU_China/Software3" target="_self">WORDSEGMENT</a></li> | ||
</ul> | </ul> | ||
</li> | </li> | ||
Line 85: | Line 214: | ||
<li><a href="https://2018.igem.org/Team:NEFU_China/Attributions" target="_self">ATTRIBUTIONS</a></li> | <li><a href="https://2018.igem.org/Team:NEFU_China/Attributions" target="_self">ATTRIBUTIONS</a></li> | ||
<li><a href="https://2018.igem.org/Team:NEFU_China/Members" target="_self">MEMBERS</a></li> | <li><a href="https://2018.igem.org/Team:NEFU_China/Members" target="_self">MEMBERS</a></li> | ||
− | |||
</ul> | </ul> | ||
</li> | </li> | ||
Line 91: | Line 219: | ||
<a href="https://2018.igem.org/Team:NEFU_China/Human_Practices"><img id="humanpractice" src="https://static.igem.org/mediawiki/2018/9/91/T--NEFU_China--_HUMANPRACTICE.png">HUMAN PRACTICE</a> | <a href="https://2018.igem.org/Team:NEFU_China/Human_Practices"><img id="humanpractice" src="https://static.igem.org/mediawiki/2018/9/91/T--NEFU_China--_HUMANPRACTICE.png">HUMAN PRACTICE</a> | ||
<ul id="sub_08"> | <ul id="sub_08"> | ||
+ | <li><a href="https://2018.igem.org/Team:NEFU_China/Human_Practices" target="_self">OVERVIEW</a></li> | ||
<li><a href="https://2018.igem.org/Team:NEFU_China/Gold_integrated" target="_self">GOLD INTEGRATED</a></li> | <li><a href="https://2018.igem.org/Team:NEFU_China/Gold_integrated" target="_self">GOLD INTEGRATED</a></li> | ||
<li><a href="https://2018.igem.org/Team:NEFU_China/Silver" target="_self">SILVER</a></li> | <li><a href="https://2018.igem.org/Team:NEFU_China/Silver" target="_self">SILVER</a></li> | ||
<li><a href="https://2018.igem.org/Team:NEFU_China/Collaborations" target="_self">COLLABORTION</a></li> | <li><a href="https://2018.igem.org/Team:NEFU_China/Collaborations" target="_self">COLLABORTION</a></li> | ||
<li><a href="https://2018.igem.org/Team:NEFU_China/Public_Engagement" target="_self">EDUCATION & PUBLIC ENGAGEMENT</a></li> | <li><a href="https://2018.igem.org/Team:NEFU_China/Public_Engagement" target="_self">EDUCATION & PUBLIC ENGAGEMENT</a></li> | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
</ul> | </ul> | ||
</li> | </li> | ||
Line 109: | Line 231: | ||
</div> | </div> | ||
<div id="banner"> | <div id="banner"> | ||
− | <img src="https://static.igem.org/mediawiki/2018/0/ | + | <img src="https://static.igem.org/mediawiki/2018/0/06/T--NEFU_China--background-title01.png" alt="banner" id="banner-img"> |
</div> | </div> | ||
+ | |||
+ | |||
+ | <div class="layer-bottom"> | ||
+ | |||
+ | <canvas id="canvas" style="background:#000000"></canvas> | ||
+ | |||
+ | <script type="text/javascript"> | ||
+ | |||
+ | window.onload = function(){ | ||
+ | var canvas = document.getElementById("canvas"); | ||
+ | var context =canvas.getContext("2d"); | ||
+ | var W = window.innerWidth; | ||
+ | var H = 2600; | ||
+ | //var H = window.innerHeight*1.5; | ||
+ | canvas.width = W; | ||
+ | canvas.height = H; | ||
+ | var fontSize = 20; | ||
+ | var colunms = Math.floor(W /fontSize); | ||
+ | var drops = []; | ||
+ | for(var i=0;i<colunms;i++){ | ||
+ | drops.push(0); | ||
+ | } | ||
+ | |||
+ | |||
+ | var str1 = "ATCG"; | ||
+ | var str2 = "01"; | ||
+ | function draw(){ | ||
+ | context.fillStyle = "rgba(0,0,0,0.2)"; | ||
+ | context.fillRect(0,0,W,H); | ||
+ | context.font = "700 "+fontSize+"px 微软雅黑"; | ||
+ | context.fillStyle = "#003544"; | ||
+ | for(var i=0;i<colunms/2;i++){ | ||
+ | var index = Math.floor(Math.random() * str1.length); | ||
+ | var x = i*fontSize; | ||
+ | var y = drops[i] *fontSize; | ||
+ | context.fillText(str1[index],x,y); | ||
+ | if(y >= canvas.height){ | ||
+ | drops[i] = 0; | ||
+ | } | ||
+ | if(Math.random() > 0.99){ | ||
+ | drops[i] = 0; | ||
+ | } | ||
+ | drops[i]++; | ||
+ | } | ||
+ | for(var i=colunms/2;i<colunms;i++){ | ||
+ | var index = Math.floor(Math.random() * str2.length); | ||
+ | var x = i*fontSize; | ||
+ | var y = drops[i] *fontSize; | ||
+ | context.fillText(str2[index],x,y); | ||
+ | if(y >= canvas.height){ | ||
+ | drops[i] = 0; | ||
+ | } | ||
+ | if(Math.random() > 0.99){ | ||
+ | drops[i] = 0; | ||
+ | } | ||
+ | drops[i]++; | ||
+ | } | ||
+ | }; | ||
+ | |||
+ | function randColor(){ | ||
+ | var r = Math.floor(Math.random() * 256); | ||
+ | var g = Math.floor(Math.random() * 256); | ||
+ | var b = Math.floor(Math.random() * 256); | ||
+ | return "rgb("+r+","+g+","+b+")"; | ||
+ | } | ||
+ | |||
+ | draw(); | ||
+ | setInterval(draw,60); | ||
+ | }; | ||
+ | |||
+ | </script> | ||
+ | |||
+ | |||
+ | |||
+ | </div> | ||
+ | |||
<div id="background-content"> | <div id="background-content"> | ||
− | <h1>Background</h1> | + | <h1 style="font-size: 65px;color: orange!important;height: 84px;">Background</h1> |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
<p> | <p> | ||
− | + | Since ancient time, people have been seeking for safe ways of information storage and transfer to combat message leaks that have recently become a public security problem and greatly concerns all over the world. To overcome this, encryption technologies have been developed and widely used to ensure the safety of important information. | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
</p> | </p> | ||
<br> | <br> | ||
<hr> | <hr> | ||
− | |||
<br> | <br> | ||
− | |||
− | |||
− | |||
− | |||
− | |||
<table id="table1"> | <table id="table1"> | ||
− | <td valign="top"> | + | <td valign="top" width="60%"> |
+ | |||
+ | <p> | ||
+ | For example, the <i>Da Vinci code cylinder</i> was recorded in the <i>Da Vinci </i>manuscript. If the messages were retrieved in a wrong way, the letter with the white phosphorus would be self-destroyed. | ||
+ | </p> | ||
+ | |||
+ | </td> | ||
+ | <td valign="top" width="40%"> | ||
+ | <img style="width: 330px;" src="https://static.igem.org/mediawiki/2018/4/47/T--NEFU_China--Introduction01.png" alt="Figure1" id="Figure1-img"> | ||
+ | |||
+ | |||
+ | </td> | ||
+ | </table> | ||
+ | <br> | ||
+ | <table id="table2" > | ||
+ | <td valign="top" width="35%"> | ||
+ | <img style="width:330px;" src="https://static.igem.org/mediawiki/2018/b/bc/T--NEFU_China--Introduction04.png" alt="Figure2" id="Figure2-img"> | ||
+ | |||
+ | </td> | ||
+ | <td valign="top" width="65%"> | ||
+ | |||
+ | |||
+ | <p> | ||
+ | However, these self-destruction approaches could not provide sufficient confidentiality. Then the steganography technique was developed, by which the information could only be present after special treatments, like dipped in alum water, instead of being read directly with naked eyes. | ||
+ | </p> | ||
+ | </td> | ||
+ | </table> | ||
+ | <br> | ||
+ | <table id="table3"> | ||
+ | <td valign="top" width="65%"> | ||
+ | |||
<p> | <p> | ||
− | + | In 1854, the Playfair cipher invented by Charles Wheatstone made the English alphabet frequency statistical analysis useless. This method is convenient and safe to be used, which also provides a great reference to our password books. | |
− | + | ||
</p> | </p> | ||
</td> | </td> | ||
− | <td valign="top"> | + | <td valign="top" width="35%" style="text-align: center; |
− | <img src="https://static.igem.org/mediawiki/2018/ | + | "> |
− | + | <img style="width:300px;" src="https://static.igem.org/mediawiki/2018/b/b1/T--NEFU_China--Introduction03.png" alt="Figure3" id="Figure3-img"> | |
+ | |||
</td> | </td> | ||
</table> | </table> | ||
− | < | + | <br> |
− | + | <table id="table4"> | |
+ | <td valign="top" width="65%"> | ||
+ | |||
+ | <p> | ||
+ | Recently, two biological encryption systems built on the spores of <i>Bacillus subtilis</i> have been used to safely send a key and an encrypted message, respectively. Based on the previous work, we planned to establish a DNA-based information storage and transmission system of high safety using the knowledge and techniques of synthetic biology and computer science, and this time, we used yeast to achieve our goal. | ||
+ | </p> | ||
+ | </td> | ||
+ | <td valign="top" width="35%" style="text-align: center; | ||
+ | "> | ||
+ | <img style="width:300px;text-align: center;" src="https://static.igem.org/mediawiki/2018/1/10/T--NEFU_China--Introduction02.png" alt="Figure4" id="Figure4-img"> | ||
+ | |||
+ | </td> | ||
+ | </table> | ||
+ | <p style="color: white"> | ||
+ | In this project, we built an information storage and transfer system with high security on using yeast spores, which consists of six modules, including<span style="color:orange"> “CODING”, “WRITE IN”, “LOCKING”, “MISLEADING”, “TIME DELAY SUICIDE” and “READ OUT”</span>. Together with the computation methods developed in this project, we designed and incorporated a considerable number of genetic parts into the six modules above to ensure the safety of information stored in and transferred using our system. <br> | ||
</p> | </p> | ||
− | < | + | <table id="table5"> |
− | + | <td valign="top" width="100%" style="text-align: center; | |
− | + | "> | |
− | + | <img style="width:100%;text-align: center;" src="https://static.igem.org/mediawiki/2018/5/5b/T--NEFU_China--background-bottom.png" alt="Figure4" > | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | </td> | |
− | + | </table> | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
</div> | </div> | ||
+ | |||
+ | |||
+ | |||
+ | |||
</body> | </body> | ||
</html> | </html> |
Latest revision as of 21:34, 17 October 2018
Background
Since ancient time, people have been seeking for safe ways of information storage and transfer to combat message leaks that have recently become a public security problem and greatly concerns all over the world. To overcome this, encryption technologies have been developed and widely used to ensure the safety of important information.
For example, the Da Vinci code cylinder was recorded in the Da Vinci manuscript. If the messages were retrieved in a wrong way, the letter with the white phosphorus would be self-destroyed. |
However, these self-destruction approaches could not provide sufficient confidentiality. Then the steganography technique was developed, by which the information could only be present after special treatments, like dipped in alum water, instead of being read directly with naked eyes. |
In 1854, the Playfair cipher invented by Charles Wheatstone made the English alphabet frequency statistical analysis useless. This method is convenient and safe to be used, which also provides a great reference to our password books. |
Recently, two biological encryption systems built on the spores of Bacillus subtilis have been used to safely send a key and an encrypted message, respectively. Based on the previous work, we planned to establish a DNA-based information storage and transmission system of high safety using the knowledge and techniques of synthetic biology and computer science, and this time, we used yeast to achieve our goal. |
In this project, we built an information storage and transfer system with high security on using yeast spores, which consists of six modules, including “CODING”, “WRITE IN”, “LOCKING”, “MISLEADING”, “TIME DELAY SUICIDE” and “READ OUT”. Together with the computation methods developed in this project, we designed and incorporated a considerable number of genetic parts into the six modules above to ensure the safety of information stored in and transferred using our system.