Team:Hong Kong-CUHK/Project

From 2010.igem.org

(Difference between revisions)
Line 390: Line 390:
<ul class="menu" >
<ul class="menu" >
<li class="item1" >
<li class="item1" >
-
<a class="bullet" href="http://137.189.51.115/igem/index.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK"  >
<span>
<span>
    Home    
    Home    
Line 399: Line 399:
</li>
</li>
<li class="item167 parent active" >
<li class="item167 parent active" >
-
<a class="bullet subtext" href="http://137.189.51.115/igem/project.html"  >
+
<a class="bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project"  >
<span>
<span>
    Project <em>iGEM 2010</em>     
    Project <em>iGEM 2010</em>     
Line 411: Line 411:
<li class="item171" >
<li class="item171" >
-
<a class="bullet" href="http://137.189.51.115/igem/project.html#pi"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project"  >
<span>
<span>
    Introduction    
    Introduction    
Line 421: Line 421:
<li class="item185" >
<li class="item185" >
-
<a class="bullet" href="http://137.189.51.115/igem/project/principle.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_principle"  >
<span>
<span>
    Principle    
    Principle    
 +
</span>
 +
</a>
 +
 +
 +
</li>
 +
 +
<li class="item191" >
 +
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_results"  >
 +
<span>
 +
    Results  
</span>
</span>
</a>
</a>
Line 431: Line 441:
<li class="item187" >
<li class="item187" >
-
<a class="bullet" href="http://137.189.51.115/igem/project/biosafety.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_biosafety"  >
<span>
<span>
    Biosafety    
    Biosafety    
Line 441: Line 451:
<li class="item189" >
<li class="item189" >
-
<a class="bullet" href="http://137.189.51.115/igem/project/ethics.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_ethics"  >
<span>
<span>
    Ethics    
    Ethics    
Line 451: Line 461:
<li class="item190" >
<li class="item190" >
-
<a class="bullet" href="http://137.189.51.115/igem/project/human-practice.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_human-practice"  >
<span>
<span>
    Human Practice    
    Human Practice    
Line 464: Line 474:
</li>
</li>
<li class="item162 parent" >
<li class="item162 parent" >
-
<a class="bullet subtext" href="http://137.189.51.115/igem/team.html"  >
+
<a class="bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Team"  >
<span>
<span>
    Team <em>CUHK2010</em>     
    Team <em>CUHK2010</em>     
Line 474: Line 484:
</li>
</li>
<li class="item182" >
<li class="item182" >
-
<a class="bullet subtext" href="http://137.189.51.115/igem/parts829c.html?Name=Value"  >
+
<a class="bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Parts"  >
<span>
<span>
    Parts <em>Submitted</em>     
    Parts <em>Submitted</em>     
Line 484: Line 494:
</li>
</li>
<li class="item180" >
<li class="item180" >
-
<a class="bullet" href="http://137.189.51.115/igem/modeling.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Model"  >
<span>
<span>
    Modeling    
    Modeling    
Line 493: Line 503:
</li>
</li>
<li class="item175" >
<li class="item175" >
-
<a class="bullet" href="http://137.189.51.115/igem/notebook.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Notebook"  >
<span>
<span>
    Notebook    
    Notebook    
Line 502: Line 512:
</li>
</li>
<li class="item168" >
<li class="item168" >
-
<a class="bullet" href="http://137.189.51.115/igem/sponsors.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Sponsors"  >
<span>
<span>
    Sponsors    
    Sponsors    

Revision as of 18:21, 27 October 2010

Project

Project

CUHK iGEM 2010 team is formed by a group of undergraduates and instructors from the Chinese University of Hong Kong. Our project is to create a brand new biological cryptography system. We harness the incredible adaptability of simple organisms in the tortured environment to make sure that the message stored can be left undisturbed regardless of any environmental changes. Employing a specially people are denied access to obtain the information.

Quick fact: 

In our system, 1g of E. coli can store max 931,322 GB data. 

In comparison, typical hard disk can store 1-4GB/gram.

As the leakage of national confidential information and personal privacy become more and more serous, we believe that this biological cryptography can help protect the important information of the mankind. The innovative cryptography system heralds a new era of information security.

Back to top

 

T

his year in the iGEM 2010 competition, we will use bacteria not only as a biological data storage unit but also to integrate an intrinsic encryption system with it.

With the advancement of electronic engineering after the World War II, more complex ciphers are developed, which plays a pivotal role in the security system of this information explosive age. However mathematical advances result in the weakening or even attack on the ciphers. It makes us rethink whether data storage and encryption in computer is the only way to ensure data safety

Using bacteria as the information storage device is not a new idea, Bancroft’s group [1] had long proposed the storage of information in DNA early in 2001. Yachie’s group[2] had also been working on the bacterial data storage method in Bacillus subtilis in 2007. In contrast to electronic data storage, the nature of bacterial data storage depends on the bacteria one would pick – Bacillus subtilis would create extra copies of the data, inserting into their genomes which would further safeguard the information; Deinococcus radiodurans, one of the most radioresistant organisms known, would survive even under the electromagnetic pulse and radiation after the nuclear attack. But how are we actually improving the security system by simply storing information in bacteria?

Next: Principle