Difference between revisions of "Team:NEFU China/Background"

Line 201: Line 201:
 
</li>
 
</li>
 
</div>
 
</div>
 +
<!--
 
<div id="banner">  
 
<div id="banner">  
 
<img src="https://static.igem.org/mediawiki/2018/0/05/T--NEFU_China--DNA.png" alt="banner" id="banner-img">
 
<img src="https://static.igem.org/mediawiki/2018/0/05/T--NEFU_China--DNA.png" alt="banner" id="banner-img">
Line 206: Line 207:
 
<div id="background-content">
 
<div id="background-content">
 
<h1 style="height: 65px;color: orange!important;">Background</h1>
 
<h1 style="height: 65px;color: orange!important;">Background</h1>
    <!--<p style="color:red">-->
+
 
 
<p>
 
<p>
 
Since ancient time, people have been seeking safe ways of information storage and transfer to combat message leaks that have recently become a public security problem and great concerns all over the world. To overcome this, encryption technologies have been developed and widely used to ensure the safety of important information.
 
Since ancient time, people have been seeking safe ways of information storage and transfer to combat message leaks that have recently become a public security problem and great concerns all over the world. To overcome this, encryption technologies have been developed and widely used to ensure the safety of important information.
Line 215: Line 216:
 
<table id="table1">
 
<table id="table1">
 
<td valign="top">
 
<td valign="top">
<!--<p style="color:yellow">-->
+
 
<p>
 
<p>
 
    For example, the Da Vinci Cryptograph was commonly used in the Tang Dynasty. If the messages were retrieved in a wrong way, the letter with the white phosphorus would be self-destroyed.
 
    For example, the Da Vinci Cryptograph was commonly used in the Tang Dynasty. If the messages were retrieved in a wrong way, the letter with the white phosphorus would be self-destroyed.
Line 231: Line 232:
 
</td>
 
</td>
 
<td valign="top">
 
<td valign="top">
<!--<p style="color:green">-->
+
 
<p>
 
<p>
 
    However, these self-destruction approaches could not provide sufficient confidentiality. Then the steganography technique was developed, by which the information could only be present after special treatments, like dipped in alum water, instead of being read directly with naked eyes.
 
    However, these self-destruction approaches could not provide sufficient confidentiality. Then the steganography technique was developed, by which the information could only be present after special treatments, like dipped in alum water, instead of being read directly with naked eyes.
Line 239: Line 240:
 
<table id="table3">
 
<table id="table3">
 
<td valign="top">
 
<td valign="top">
<!--<p style="color: mediumblue">-->
+
 
<p>
 
<p>
 
In 1854, the Playfair cipher invented by Charles Wheatstone made the English alphabet frequency statistical analysis useless. This method is convenient and safe to be used, which also provides a great reference to our password books.
 
In 1854, the Playfair cipher invented by Charles Wheatstone made the English alphabet frequency statistical analysis useless. This method is convenient and safe to be used, which also provides a great reference to our password books.
Line 251: Line 252:
 
<table id="table4">
 
<table id="table4">
 
<td valign="top">
 
<td valign="top">
<!--<p style="color:deepskyblue">-->
+
 
<p>
 
<p>
 
    Recently, two biological encryption systems built on the spores of Bacillus subtilis have been used to safely send a key and an encrypted message, respectively. Based on the previous work, we planned to establish a DNA-based information storage and transmission system of high safety using the knowledge and techniques of synthetic biology and computer science, and this time, we used yeast to achieve our goal.
 
    Recently, two biological encryption systems built on the spores of Bacillus subtilis have been used to safely send a key and an encrypted message, respectively. Based on the previous work, we planned to establish a DNA-based information storage and transmission system of high safety using the knowledge and techniques of synthetic biology and computer science, and this time, we used yeast to achieve our goal.
Line 282: Line 283:
 
<br><br><br>
 
<br><br><br>
 
</div>
 
</div>
 +
-->
 
<div class="layer-bottom">
 
<div class="layer-bottom">
 
 

Revision as of 07:41, 15 October 2018

Background

Userfull links

Home      Model     Project    Software

Parts       Teams    Results   Notebook

Human  Practice

Follow us

facebook     twitter     wehchat
facebook     twitter     wehchat

Contact us

iGEM-NEFU_China2018

Email: hexinglu@nefu.edu.cn

No.26 Hexing Road, Xiangfang
District, Harbin, Heilongjiang
Province 150000