Team:Hong Kong-CUHK/Project

From 2010.igem.org

(Difference between revisions)
 
(6 intermediate revisions not shown)
Line 62: Line 62:
#menubar{
#menubar{
font-size:55%;
font-size:55%;
-
}          
+
}
-
body.page-Team:Hong Kong-CUHK/Project h1.firstHeading { display:none; }
+
       
-
body.page-Team:Hong Kong-CUHK/Project #menubar { top:0px; }
+
body.page-Team_Hong_Kong-CUHK_Project h1.firstHeading { display:none; }
-
body.page-Team:Hong Kong-CUHK/Project table{background:none;}
+
body.page-Team_Hong_Kong-CUHK_Project #menubar { top:0px; }
-
body.page-Team:Hong Kong-CUHK/Project ul.special-7 li {background: url(http://137.189.51.115/igem/templates/rt_moxy_j15/images/typo/special-7.png) no-repeat 0px 1px;}
+
body.page-Team_Hong_Kong-CUHK_Project table{background:none;}
-
body.page-Team_Hong_Kong-CUHK #main-body a, body.page-Team_Hong_Kong-CUHK #bottom a, body.page-Team_Hong_Kong-CUHK #main-content body.page-Team_Hong_Kong-CUHK #footer a, body.page-Team_Hong_Kong-CUHK a, body.page-Team_Hong_Kong-CUHK .moduletable h3 span, body.page-Team_Hong_Kong-CUHK .contentheading span {color: #1366A3;}
+
body.page-Team_Hong_Kong-CUHK_Project ul.special-7 li {background: url(http://137.189.51.115/igem/templates/rt_moxy_j15/images/typo/special-7.png) no-repeat 0px 1px;}
 +
body.page-Team_Hong_Kong-CUHK_Project #main-body a, body.page-Team_Hong_Kong-CUHK_Project #bottom a, body.page-Team_Hong_Kong-CUHK_Project #main-content body.page-Team_Hong_Kong-CUHK_Project #footer a, body.page-Team_Hong_Kong-CUHK_Project a, body.page-Team_Hong_Kong-CUHK_Project .moduletable h3 span, body.page-Team_Hong_Kong-CUHK_Project .contentheading span {color: #1366A3;}
/* Wiki Hacks - END */
/* Wiki Hacks - END */
div.wrapper { margin: 0 auto; width: 982px;padding:0;}
div.wrapper { margin: 0 auto; width: 982px;padding:0;}
Line 136: Line 137:
<div id="horizmenu-surround">
<div id="horizmenu-surround">
<ul class="menutop level1" >
<ul class="menutop level1" >
-
<li class="item1 root" >
+
<li class="item1 active root" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/index.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK"  >
<span>
<span>
    Home    
    Home    
Line 145: Line 146:
</li>
</li>
-
<li class="item167 parent active root" >
+
<li class="item167 parent root" >
-
<a class="daddy item bullet subtext" href="http://137.189.51.115/igem/project.html"  >
+
<a class="daddy item bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project"  >
<span>
<span>
    Project <em>iGEM 2010</em>     
    Project <em>iGEM 2010</em>     
Line 158: Line 159:
<li class="item171" >
<li class="item171" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/project.html#pi"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project"  >
<span>
<span>
    Introduction    
    Introduction    
Line 168: Line 169:
<li class="item185" >
<li class="item185" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/project/principle.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_principle"  >
<span>
<span>
    Principle    
    Principle    
 +
</span>
 +
</a>
 +
 +
 +
</li>
 +
 +
<li class="item191" >
 +
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_results"  >
 +
<span>
 +
    Results  
</span>
</span>
</a>
</a>
Line 178: Line 189:
<li class="item187" >
<li class="item187" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/project/biosafety.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_biosafety"  >
<span>
<span>
    Biosafety    
    Biosafety    
Line 188: Line 199:
<li class="item189" >
<li class="item189" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/project/ethics.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_ethics"  >
<span>
<span>
    Ethics    
    Ethics    
Line 198: Line 209:
<li class="item190" >
<li class="item190" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/project/human-practice.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_human-practice"  >
<span>
<span>
    Human Practice    
    Human Practice    
Line 211: Line 222:
</li>
</li>
<li class="item162 parent root" >
<li class="item162 parent root" >
-
<a class="daddy item bullet subtext" href="http://137.189.51.115/igem/team.html"  >
+
<a class="daddy item bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Team"  >
<span>
<span>
    Team <em>CUHK2010</em>     
    Team <em>CUHK2010</em>     
Line 223: Line 234:
<li class="item163" >
<li class="item163" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/team/overview.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Team_overview"  >
<span>
<span>
    Overview    
    Overview    
Line 233: Line 244:
<li class="item164" >
<li class="item164" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/team/students.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Team_students"  >
<span>
<span>
    Students    
    Students    
Line 243: Line 254:
<li class="item166" >
<li class="item166" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/team/advisors.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Team_advisors"  >
<span>
<span>
    Advisors    
    Advisors    
Line 253: Line 264:
<li class="item184" >
<li class="item184" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/team/gallery.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Team_gallery"  >
<span>
<span>
    Gallery    
    Gallery    
Line 266: Line 277:
</li>
</li>
<li class="item182 root" >
<li class="item182 root" >
-
<a class="orphan item bullet subtext" href="http://137.189.51.115/igem/parts829c.html?Name=Value"  >
+
<a class="orphan item bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Parts"  >
<span>
<span>
    Parts <em>Submitted</em>     
    Parts <em>Submitted</em>     
Line 276: Line 287:
</li>
</li>
<li class="item180 root" >
<li class="item180 root" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/modeling.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Model"  >
<span>
<span>
    Modeling    
    Modeling    
Line 285: Line 296:
</li>
</li>
<li class="item175 root" >
<li class="item175 root" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/notebook.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Notebook"  >
<span>
<span>
    Notebook    
    Notebook    
Line 294: Line 305:
</li>
</li>
<li class="item168 root" >
<li class="item168 root" >
-
<a class="orphan item bullet" href="http://137.189.51.115/igem/sponsors.html"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Sponsors"  >
<span>
<span>
    Sponsors    
    Sponsors    
Line 314: Line 325:
<!--Begin Logo-->
<!--Begin Logo-->
<div class="logo-module">
<div class="logo-module">
-
<a href="http://137.189.51.115/igem/index.html" id="logo"></a>
+
<a href="https://2010.igem.org/Team:Hong_Kong-CUHK" id="logo"></a>
</div>
</div>
<!--End Logo-->
<!--End Logo-->
Line 353: Line 364:
<p><span class="inset-right">Quick fact:&nbsp;<br /><br />In our system, 1g of&nbsp;<em>E. coli</em> can store max 931,322 GB data.&nbsp;<br /><br />In comparison, typical hard disk can store 1-4GB/gram.</span></p>
<p><span class="inset-right">Quick fact:&nbsp;<br /><br />In our system, 1g of&nbsp;<em>E. coli</em> can store max 931,322 GB data.&nbsp;<br /><br />In comparison, typical hard disk can store 1-4GB/gram.</span></p>
<p>As the leakage of national confidential information and personal privacy become more and more serous, we believe that this biological cryptography can help protect the important information of the mankind. The innovative cryptography system heralds a new era of information security.</p>
<p>As the leakage of national confidential information and personal privacy become more and more serous, we believe that this biological cryptography can help protect the important information of the mankind. The innovative cryptography system heralds a new era of information security.</p>
-
<p><a href="http://137.189.51.115/igem/project.html">Back to top</a></p>
 
<p> </p>
<p> </p>
<p><span class="dropcap-blue">T</span></p>
<p><span class="dropcap-blue">T</span></p>
Line 359: Line 369:
<p>With the advancement of electronic engineering after the World War II, more complex ciphers are developed, which plays a pivotal role in the security system of this information explosive age. However mathematical advances result in the weakening or even attack on the ciphers. It makes us rethink whether data storage and encryption in computer is the only way to ensure data safety</p>
<p>With the advancement of electronic engineering after the World War II, more complex ciphers are developed, which plays a pivotal role in the security system of this information explosive age. However mathematical advances result in the weakening or even attack on the ciphers. It makes us rethink whether data storage and encryption in computer is the only way to ensure data safety</p>
<p>Using bacteria as the information storage device is not a new idea, Bancroft’s group [1] had long proposed the storage of information in DNA early in 2001. Yachie’s group[2] had also been working on the bacterial data storage method in Bacillus subtilis in 2007. In contrast to electronic data storage, the nature of bacterial data storage depends on the bacteria one would pick – Bacillus subtilis would create extra copies of the data, inserting into their genomes which would further safeguard the information; Deinococcus radiodurans, one of the most radioresistant organisms known, would survive even under the electromagnetic pulse and radiation after the nuclear attack. But how are we actually improving the security system by simply storing information in bacteria?</p>
<p>Using bacteria as the information storage device is not a new idea, Bancroft’s group [1] had long proposed the storage of information in DNA early in 2001. Yachie’s group[2] had also been working on the bacterial data storage method in Bacillus subtilis in 2007. In contrast to electronic data storage, the nature of bacterial data storage depends on the bacteria one would pick – Bacillus subtilis would create extra copies of the data, inserting into their genomes which would further safeguard the information; Deinococcus radiodurans, one of the most radioresistant organisms known, would survive even under the electromagnetic pulse and radiation after the nuclear attack. But how are we actually improving the security system by simply storing information in bacteria?</p>
-
<p><a href="http://137.189.51.115/igem/project/principle.html">Next: Principle</a></p>
+
<p><a href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_principle">Next: Principle</a></p>
<div class="article-ratings">
<div class="article-ratings">
Line 380: Line 390:
<ul class="menu" >
<ul class="menu" >
<li class="item1" >
<li class="item1" >
-
<a class="bullet" href="http://137.189.51.115/igem/index.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK"  >
<span>
<span>
    Home    
    Home    
Line 389: Line 399:
</li>
</li>
<li class="item167 parent active" >
<li class="item167 parent active" >
-
<a class="bullet subtext" href="http://137.189.51.115/igem/project.html"  >
+
<a class="bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project"  >
<span>
<span>
    Project <em>iGEM 2010</em>     
    Project <em>iGEM 2010</em>     
Line 401: Line 411:
<li class="item171" >
<li class="item171" >
-
<a class="bullet" href="http://137.189.51.115/igem/project.html#pi"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project"  >
<span>
<span>
    Introduction    
    Introduction    
Line 411: Line 421:
<li class="item185" >
<li class="item185" >
-
<a class="bullet" href="http://137.189.51.115/igem/project/principle.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_principle"  >
<span>
<span>
    Principle    
    Principle    
 +
</span>
 +
</a>
 +
 +
 +
</li>
 +
 +
<li class="item191" >
 +
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_results"  >
 +
<span>
 +
    Results  
</span>
</span>
</a>
</a>
Line 421: Line 441:
<li class="item187" >
<li class="item187" >
-
<a class="bullet" href="http://137.189.51.115/igem/project/biosafety.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_biosafety"  >
<span>
<span>
    Biosafety    
    Biosafety    
Line 431: Line 451:
<li class="item189" >
<li class="item189" >
-
<a class="bullet" href="http://137.189.51.115/igem/project/ethics.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_ethics"  >
<span>
<span>
    Ethics    
    Ethics    
Line 441: Line 461:
<li class="item190" >
<li class="item190" >
-
<a class="bullet" href="http://137.189.51.115/igem/project/human-practice.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_human-practice"  >
<span>
<span>
    Human Practice    
    Human Practice    
Line 454: Line 474:
</li>
</li>
<li class="item162 parent" >
<li class="item162 parent" >
-
<a class="bullet subtext" href="http://137.189.51.115/igem/team.html"  >
+
<a class="bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Team"  >
<span>
<span>
    Team <em>CUHK2010</em>     
    Team <em>CUHK2010</em>     
Line 464: Line 484:
</li>
</li>
<li class="item182" >
<li class="item182" >
-
<a class="bullet subtext" href="http://137.189.51.115/igem/parts829c.html?Name=Value"  >
+
<a class="bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Parts"  >
<span>
<span>
    Parts <em>Submitted</em>     
    Parts <em>Submitted</em>     
Line 474: Line 494:
</li>
</li>
<li class="item180" >
<li class="item180" >
-
<a class="bullet" href="http://137.189.51.115/igem/modeling.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Model"  >
<span>
<span>
    Modeling    
    Modeling    
Line 483: Line 503:
</li>
</li>
<li class="item175" >
<li class="item175" >
-
<a class="bullet" href="http://137.189.51.115/igem/notebook.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Notebook"  >
<span>
<span>
    Notebook    
    Notebook    
Line 492: Line 512:
</li>
</li>
<li class="item168" >
<li class="item168" >
-
<a class="bullet" href="http://137.189.51.115/igem/sponsors.html"  >
+
<a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Sponsors"  >
<span>
<span>
    Sponsors    
    Sponsors    

Latest revision as of 21:24, 27 October 2010

Project

Project

CUHK iGEM 2010 team is formed by a group of undergraduates and instructors from the Chinese University of Hong Kong. Our project is to create a brand new biological cryptography system. We harness the incredible adaptability of simple organisms in the tortured environment to make sure that the message stored can be left undisturbed regardless of any environmental changes. Employing a specially people are denied access to obtain the information.

Quick fact: 

In our system, 1g of E. coli can store max 931,322 GB data. 

In comparison, typical hard disk can store 1-4GB/gram.

As the leakage of national confidential information and personal privacy become more and more serous, we believe that this biological cryptography can help protect the important information of the mankind. The innovative cryptography system heralds a new era of information security.

 

T

his year in the iGEM 2010 competition, we will use bacteria not only as a biological data storage unit but also to integrate an intrinsic encryption system with it.

With the advancement of electronic engineering after the World War II, more complex ciphers are developed, which plays a pivotal role in the security system of this information explosive age. However mathematical advances result in the weakening or even attack on the ciphers. It makes us rethink whether data storage and encryption in computer is the only way to ensure data safety

Using bacteria as the information storage device is not a new idea, Bancroft’s group [1] had long proposed the storage of information in DNA early in 2001. Yachie’s group[2] had also been working on the bacterial data storage method in Bacillus subtilis in 2007. In contrast to electronic data storage, the nature of bacterial data storage depends on the bacteria one would pick – Bacillus subtilis would create extra copies of the data, inserting into their genomes which would further safeguard the information; Deinococcus radiodurans, one of the most radioresistant organisms known, would survive even under the electromagnetic pulse and radiation after the nuclear attack. But how are we actually improving the security system by simply storing information in bacteria?

Next: Principle