Line 3: | Line 3: | ||
<meta charset="utf-8"> | <meta charset="utf-8"> | ||
− | <title> | + | <title>Background</title> |
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-menu&action=raw&ctype=text/css" rel="stylesheet" type="text/css"> | <link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-menu&action=raw&ctype=text/css" rel="stylesheet" type="text/css"> | ||
Line 23: | Line 23: | ||
margin-left: 0px; | margin-left: 0px; | ||
} | } | ||
+ | |||
#menu li ul li:hover ul{ | #menu li ul li:hover ul{ | ||
background:rgba(0,0,0,0.75)!important; | background:rgba(0,0,0,0.75)!important; | ||
Line 112: | Line 113: | ||
font-family: 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji' !important; | font-family: 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji' !important; | ||
} | } | ||
+ | .layer-bottom { | ||
+ | z-index: -2; | ||
+ | position: absolute; | ||
+ | margin-top: 36px!important; | ||
+ | } | ||
+ | |||
</style> | </style> | ||
Line 198: | Line 205: | ||
<img src="https://static.igem.org/mediawiki/2018/0/05/T--NEFU_China--DNA.png" alt="banner" id="banner-img"> | <img src="https://static.igem.org/mediawiki/2018/0/05/T--NEFU_China--DNA.png" alt="banner" id="banner-img"> | ||
</div> | </div> | ||
+ | |||
+ | |||
<div class="layer-bottom"> | <div class="layer-bottom"> | ||
Line 272: | Line 281: | ||
</div> | </div> | ||
+ | |||
<div id="background-content"> | <div id="background-content"> | ||
− | <h1 | + | <h1 style="height: 65px;color: orange!important;">Background</h1> |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
<p> | <p> | ||
− | + | Since ancient time, people have been seeking safe ways of information storage and transfer to combat message leaks that have recently become a public security problem and great concerns all over the world. To overcome this, encryption technologies have been developed and widely used to ensure the safety of important information. | |
</p> | </p> | ||
<br> | <br> | ||
<hr> | <hr> | ||
− | |||
<br> | <br> | ||
− | |||
− | |||
− | |||
− | |||
− | |||
<table id="table1"> | <table id="table1"> | ||
<td valign="top"> | <td valign="top"> | ||
+ | |||
<p> | <p> | ||
− | + | For example, the Da Vinci Cryptograph was commonly used in the Tang Dynasty. If the messages were retrieved in a wrong way, the letter with the white phosphorus would be self-destroyed. | |
− | + | </p> | |
− | + | ||
</td> | </td> | ||
+ | <td valign="top"> | ||
+ | <img src="https://static.igem.org/mediawiki/2018/2/2f/T--NEFU_China--Figure_2.png" alt="Figure1" id="Figure1-img"> | ||
+ | <h2 id="Figure1-title">Figure 1: This is Figure 1.</h2> | ||
+ | </td> | ||
+ | </table> | ||
+ | <table id="table2"> | ||
<td valign="top"> | <td valign="top"> | ||
<img src="https://static.igem.org/mediawiki/2018/2/2f/T--NEFU_China--Figure_2.png" alt="Figure2" id="Figure2-img"> | <img src="https://static.igem.org/mediawiki/2018/2/2f/T--NEFU_China--Figure_2.png" alt="Figure2" id="Figure2-img"> | ||
<h2 id="Figure2-title">Figure 2: This is Figure 2.</h2> | <h2 id="Figure2-title">Figure 2: This is Figure 2.</h2> | ||
+ | </td> | ||
+ | <td valign="top"> | ||
+ | |||
+ | <p> | ||
+ | However, these self-destruction approaches could not provide sufficient confidentiality. Then the steganography technique was developed, by which the information could only be present after special treatments, like dipped in alum water, instead of being read directly with naked eyes. | ||
+ | </p> | ||
</td> | </td> | ||
</table> | </table> | ||
− | < | + | <table id="table3"> |
− | + | <td valign="top"> | |
+ | |||
+ | <p> | ||
+ | In 1854, the Playfair cipher invented by Charles Wheatstone made the English alphabet frequency statistical analysis useless. This method is convenient and safe to be used, which also provides a great reference to our password books. | ||
+ | </p> | ||
+ | </td> | ||
+ | <td valign="top"> | ||
+ | <img src="https://static.igem.org/mediawiki/2018/2/2f/T--NEFU_China--Figure_2.png" alt="Figure3" id="Figure3-img"> | ||
+ | <h2 id="Figure3-title">Figure 3: This is Figure 3.</h2> | ||
+ | </td> | ||
+ | </table> | ||
+ | <table id="table4"> | ||
+ | <td valign="top"> | ||
+ | |||
+ | <p> | ||
+ | Recently, two biological encryption systems built on the spores of Bacillus subtilis have been used to safely send a key and an encrypted message, respectively. Based on the previous work, we planned to establish a DNA-based information storage and transmission system of high safety using the knowledge and techniques of synthetic biology and computer science, and this time, we used yeast to achieve our goal. | ||
+ | </p> | ||
+ | </td> | ||
+ | <td valign="top"> | ||
+ | <img src="https://static.igem.org/mediawiki/2018/2/2f/T--NEFU_China--Figure_2.png" alt="Figure4" id="Figure4-img"> | ||
+ | <h2 id="Figure4-title">Figure 4: This is Figure 4.</h2> | ||
+ | </td> | ||
+ | </table> | ||
+ | <p style="color: black"> | ||
+ | In this project, we built an information storage and transfer system with high security on using yeast spores, which consists of six modules, including “CODING”, “WRITE IN”, “LOCKING”, “MISLEADING”, “TIME DELAY SUICIDE” and “READ OUT”. Together with the computation methods developed in this project, we designed and incorporated a considerable number of genetic parts into the six modules above to ensure the safety of information stored in and transferred using our system. | ||
</p> | </p> | ||
<br><br><br> | <br><br><br> | ||
</div> | </div> | ||
+ | |||
<div id="background-reference"> | <div id="background-reference"> | ||
<h1>Reference</h1> | <h1>Reference</h1> | ||
Line 336: | Line 361: | ||
<br><br><br> | <br><br><br> | ||
</div> | </div> | ||
+ | |||
<div class="background-foot"> | <div class="background-foot"> | ||
<div id="foot-title"> | <div id="foot-title"> | ||
Line 343: | Line 369: | ||
<h1>Userfull links</h1> | <h1>Userfull links</h1> | ||
<h2> | <h2> | ||
− | <a href="https://2018.igem.org/Team: | + | <a href="https://2018.igem.org/Team:NEFU_China">Home</a> |
| | ||
− | <a href="https://2018.igem.org/Team:NEFU_China/ | + | <a href="https://2018.igem.org/Team:NEFU_China/Model">Model</a> |
| | ||
− | <a href="https://2018.igem.org/Team:NEFU_China | + | <a href="https://2018.igem.org/Team:NEFU_China/Description">Project</a> |
| | ||
− | <a href="https://2018.igem.org/Team:NEFU_China/ | + | <a href="https://2018.igem.org/Team:NEFU_China/Software">Software</a> |
</h2> | </h2> | ||
<h2> | <h2> | ||
− | <a href="https://2018.igem.org/Team:NEFU_China/ | + | |
+ | <a href="https://2018.igem.org/Team:NEFU_China/Basic_Part">Parts</a> | ||
| | ||
− | <a href="https://2018.igem.org/Team:NEFU_China | + | <a href="https://2018.igem.org/Team:NEFU_China/Members">Teams</a> |
| | ||
− | <a href="https://2018.igem.org/Team:NEFU_China/ | + | <a href="https://2018.igem.org/Team:NEFU_China/Lock_Key">Results</a> |
| | ||
− | <a href="https://2018.igem.org/Team:NEFU_China/ | + | <a href="https://2018.igem.org/Team:NEFU_China/Notebook">Notebook</a> |
</h2> | </h2> | ||
<h2> | <h2> | ||
− | <a href="https://2018.igem.org/Team:NEFU_China/ | + | <a href="https://2018.igem.org/Team:NEFU_China/Human_Practices">Human Practice</a> |
</h2> | </h2> | ||
</td> | </td> |
Revision as of 11:20, 15 October 2018
Background
Since ancient time, people have been seeking safe ways of information storage and transfer to combat message leaks that have recently become a public security problem and great concerns all over the world. To overcome this, encryption technologies have been developed and widely used to ensure the safety of important information.
For example, the Da Vinci Cryptograph was commonly used in the Tang Dynasty. If the messages were retrieved in a wrong way, the letter with the white phosphorus would be self-destroyed. |
Figure 1: This is Figure 1. |
Figure 2: This is Figure 2. |
However, these self-destruction approaches could not provide sufficient confidentiality. Then the steganography technique was developed, by which the information could only be present after special treatments, like dipped in alum water, instead of being read directly with naked eyes. |
In 1854, the Playfair cipher invented by Charles Wheatstone made the English alphabet frequency statistical analysis useless. This method is convenient and safe to be used, which also provides a great reference to our password books. |
Figure 3: This is Figure 3. |
Recently, two biological encryption systems built on the spores of Bacillus subtilis have been used to safely send a key and an encrypted message, respectively. Based on the previous work, we planned to establish a DNA-based information storage and transmission system of high safety using the knowledge and techniques of synthetic biology and computer science, and this time, we used yeast to achieve our goal. |
Figure 4: This is Figure 4. |
In this project, we built an information storage and transfer system with high security on using yeast spores, which consists of six modules, including “CODING”, “WRITE IN”, “LOCKING”, “MISLEADING”, “TIME DELAY SUICIDE” and “READ OUT”. Together with the computation methods developed in this project, we designed and incorporated a considerable number of genetic parts into the six modules above to ensure the safety of information stored in and transferred using our system.
Reference
[1] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. Nat Chem Biol 13 , 432-438
[2] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. Nat Chem Biol 13 , 432-438
[3] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. Nat Chem Biol 13 , 432-438
[4] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. Nat Chem Biol 13 , 432-438
[5] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. Nat Chem Biol 13 , 432-438
[6] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. Nat Chem Biol 13 , 432-438 s