Team:Hong Kong-CUHK/Project principle

From 2010.igem.org

(Difference between revisions)
(New page: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang=...)
Line 1: Line 1:
-
 
-
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
 
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >
Line 8: Line 6:
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
-
   <title>Principle</title>
+
   <title>Project </title>
   <link rel="stylesheet" href="http://137.189.51.115/igem/plugins/system/rokbox/themes/light/rokbox-style.css" type="text/css" />
   <link rel="stylesheet" href="http://137.189.51.115/igem/plugins/system/rokbox/themes/light/rokbox-style.css" type="text/css" />
   <link rel="stylesheet" href="http://137.189.51.115/igem/templates/rt_moxy_j15/css/template.css" type="text/css" />
   <link rel="stylesheet" href="http://137.189.51.115/igem/templates/rt_moxy_j15/css/template.css" type="text/css" />
Line 64: Line 62:
#menubar{
#menubar{
font-size:55%;
font-size:55%;
-
}          
+
}
-
body.page-Team_Hong_Kong-CUHK_Project h1.firstHeading { display:none; }
+
 
-
body.page-Team_Hong_Kong-CUHK_Project #menubar { top:0px; }
+
body.page-Team_Hong_Kong-CUHK_Project_principle h1.firstHeading { display:none; }
-
body.page-Team_Hong_Kong-CUHK_Project table{background:none;}
+
body.page-Team_Hong_Kong-CUHK_Project_principle #menubar { top:0px; }
-
body.page-Team_Hong_Kong-CUHK_Project ul.special-7 li {background: url(http://137.189.51.115/igem/templates/rt_moxy_j15/images/typo/special-7.png) no-repeat 0px 1px;}
+
body.page-Team_Hong_Kong-CUHK_Project_principle table{background:none;}
-
body.page-Team_Hong_Kong-CUHK_Project #main-body a, body.page-Team_Hong_Kong-CUHK_Project #bottom a, body.page-Team_Hong_Kong-CUHK_Project #main-content body.page-Team_Hong_Kong-CUHK_Project #footer a, body.page-Team_Hong_Kong-CUHK_Project a, body.page-Team_Hong_Kong-CUHK_Project .moduletable h3 span, body.page-Team_Hong_Kong-CUHK_Project .contentheading span {color: #1366A3;}
+
body.page-Team_Hong_Kong-CUHK_Project_principle ul.special-7 li {background: url(http://137.189.51.115/igem/templates/rt_moxy_j15/images/typo/special-7.png) no-repeat 0px 1px;}
 +
body.page-Team_Hong_Kong-CUHK_Project_principle #main-body a, body.page-Team_Hong_Kong-CUHK_Project_principle #bottom a, body.page-Team_Hong_Kong-CUHK_Project_principle #main-content body.page-Team_Hong_Kong-CUHK_Project_principle #footer a, body.page-Team_Hong_Kong-CUHK_Project_principle a, body.page-Team_Hong_Kong-CUHK_Project_principle .moduletable h3 span, body.page-Team_Hong_Kong-CUHK_Project_principle .contentheading span {color: #1366A3;}
/* Wiki Hacks - END */
/* Wiki Hacks - END */
div.wrapper { margin: 0 auto; width: 982px;padding:0;}
div.wrapper { margin: 0 auto; width: 982px;padding:0;}
Line 102: Line 101:
   <script type="text/javascript" src="http://137.189.51.115/igem/templates/rt_moxy_j15/js/rokutils.inputs.js"></script>
   <script type="text/javascript" src="http://137.189.51.115/igem/templates/rt_moxy_j15/js/rokutils.inputs.js"></script>
   <script type="text/javascript">
   <script type="text/javascript">
-
var rokboxPath = '../plugins/system/rokbox/index.html';
+
var rokboxPath = 'plugins/system/rokbox/index.html';
        window.addEvent('domready', function() {
        window.addEvent('domready', function() {
new Fusion('ul.menutop', {
new Fusion('ul.menutop', {
Line 138: Line 137:
<div id="horizmenu-surround">
<div id="horizmenu-surround">
<ul class="menutop level1" >
<ul class="menutop level1" >
-
<li class="item1 root" >
+
<li class="item1 active root" >
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK"  >
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK"  >
<span>
<span>
Line 147: Line 146:
</li>
</li>
-
<li class="item167 parent active root" >
+
<li class="item167 parent root" >
<a class="daddy item bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project"  >
<a class="daddy item bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project"  >
<span>
<span>
Line 170: Line 169:
<li class="item185" >
<li class="item185" >
-
<a class="orphan item active bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_principle"  >
+
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_principle"  >
<span>
<span>
    Principle    
    Principle    
Line 355: Line 354:
<div class="article-rel-wrapper">
<div class="article-rel-wrapper">
<h2 class="contentheading">
<h2 class="contentheading">
-
Principle </h2>
+
Project </h2>
</div>
</div>
Line 362: Line 361:
-
<p><h3>Bioencryption by recombination--Principle</h3></p>
+
<p><p><span class="dropcap-purple">C</span>UHK iGEM 2010 team is formed by a group of undergraduates and instructors from the Chinese University of Hong Kong. Our project is to create a brand new biological cryptography system. We harness the incredible adaptability of simple organisms in the tortured environment to make sure that the message stored can be left undisturbed regardless of any environmental changes. Employing a specially people are denied access to obtain the information.</p></p>
-
<p><img style="padding: 5px;" align="right" border="0" src="http://137.189.51.115/igem/images/stories/coli.png" />Site-specific recombination systems are classified into two distinctive groups, integration-excision and inversion systems. &nbsp;Our Shufflon system use the latter one. In this shufflon system, Rci-mediated recombination occur between any repeat sequences causing inversion of the DNA segments independently or in groups.</p>
+
<p><span class="inset-right">Quick fact:&nbsp;<br /><br />In our system, 1g of&nbsp;<em>E. coli</em> can store max 931,322 GB data.&nbsp;<br /><br />In comparison, typical hard disk can store 1-4GB/gram.</span></p>
-
<p>Rci-dependent deletion of shufflon segment flanked by the natural repeat sequences was not occurred, i.e. , the DNA sequences between repeat after recombination are conserved and no loss of DNA sequence was found.</p>
+
<p>As the leakage of national confidential information and personal privacy become more and more serous, we believe that this biological cryptography can help protect the important information of the mankind. The innovative cryptography system heralds a new era of information security.</p>
-
<p>For the repeat sequence, there are mainly four group.s, repeat a, b, c, d. There are seven different repeat sequence in nature. There are repeat 1-7. Repeat 1,2 belong to repeat a, repeat 4, 6, 7 belong to repeat b, repeat 5 belongs to repeat c, and repeat 3 belongs to repeat d.</p>
+
<p><a href="http://137.189.51.115/igem/project.html">Back to top</a></p>
-
<p>Experiments showing that the inversion frequency with DNA sequences flanked by two repeat a is the best, and it is much higher than that with any two combination of repeat a, b, c, d flanking the DNA sequence.</p>
+
-
<p>There are 12 bp sequences before every 19 bp repeat sequence. With this sequence, it can further enhance the inversion frequency, while the mechanism is yet unknown. In our project, we just need to exploit the shufflon system for recombination. Therefore, we added the specific 12 bp sequences before every 19 bp repeat sequence we added.</p>
+
-
<p>For the Rci recombinase, it is shown that the inversion caused by the wide type (WT) &nbsp;is greater than that with modified, or point mutation at some positions of rci gene. Therefore, we decide to use wide type rci recombinase in our project.</p>
+
<p> </p>
<p> </p>
-
<p><h3>Rci recombination system:</h3></p>
+
<p><span class="dropcap-blue">T</span></p>
-
<p>
+
<p>his year in the iGEM 2010 competition, we will use bacteria not only as a biological data storage unit but also to integrate an intrinsic encryption system with it.</p>
-
<object codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=10,0,32,18" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" type="application/x-shockwave-flash" height="500" width="650">
+
<p>With the advancement of electronic engineering after the World War II, more complex ciphers are developed, which plays a pivotal role in the security system of this information explosive age. However mathematical advances result in the weakening or even attack on the ciphers. It makes us rethink whether data storage and encryption in computer is the only way to ensure data safety</p>
-
<param name="src" value="../images/stories/shufflon.swf" /><embed height="500" width="650" src="http://137.189.51.115/igem/images/stories/shufflon.swf" type="application/x-shockwave-flash"></embed>&nbsp;
+
<p>Using bacteria as the information storage device is not a new idea, Bancroft’s group [1] had long proposed the storage of information in DNA early in 2001. Yachie’s group[2] had also been working on the bacterial data storage method in Bacillus subtilis in 2007. In contrast to electronic data storage, the nature of bacterial data storage depends on the bacteria one would pick – Bacillus subtilis would create extra copies of the data, inserting into their genomes which would further safeguard the information; Deinococcus radiodurans, one of the most radioresistant organisms known, would survive even under the electromagnetic pulse and radiation after the nuclear attack. But how are we actually improving the security system by simply storing information in bacteria?</p>
-
</object>
+
<p><a href="http://137.189.51.115/igem/project/principle.html">Next: Principle</a></p>
-
&nbsp;</p>
+
-
<p>In our project, we constructed a Rci recombination system, with regulation of expression.</p>
+
-
<p>First, a promotor, which was a lac operon, was located in the beginning of the system. It allowed users to use IPTG as a regulator to control expression of rci recombinase. The Ribosome binding site (RBS) was allocated at second position, next to rci recombinase at third place. RBS allowed ribosome binding before translational process, so ribosome can translate the rci gene right after RBS gene. Finally, a bidirectional double terminator was allocated at the forth position. It allowed terminator on both direction of transcription, so there was no reverse transcription of rci gene into mRNA which led to wrong protein formation.</p>
+
-
<p><h3>Translation is just the first step</h3></p>
+
-
<p><img style="padding: 5px;" align="right" border="0" src="http://137.189.51.115/igem/images/stories/encode.gif" />Our system takes in a progressive approach when transforming information to DNA.</p>
+
-
<p>A translation table would first need to be constructed by the client, the extended ASCII table with 256 characters were used as standard in here. It is not difficult to identify DNA as a naturally referred as a quaternary numeral system, With the DNA base adenosine representing the number “0”, thymine representing “1”, cytosine representing “2” and guanine representing “3”, we are essentially encoding the 256 characters with this base-4 numeral system.</p>
+
-
<p><h3>Compression is the key</h3></p>
+
-
<p><img style="padding-right: 20px; padding-bottom: 20px;" align="left" border="0" src="http://137.189.51.115/igem/images/stories/compress-th.png" />Before subjecting the DNA sequences to synthesis, a compression step is subsequent to the translation process.</p>
+
-
<p>Deflate – renowned as a lossless data compression algorithm that uses a combination of Huffman coding and LZ77 algorithm, this compression process is beneficial in two aspects – firstly, more information could be included when comparing to the uncompressed message of the same length and secondly, homopolymer and repetitive regions could be reduced significantly. This is fundamentally crucial to the infrastructure of the DNA storage system as homopolymer and repetitive regions in DNA sequences are devastating to both DNA synthesis and sequencing, with the compression algorithms these cases would be minimal.</p>
+
-
<p><h3>An infrastructure to the true, massively parallel storage system</h3><img style="padding: 5px;" align="right" border="0" src="http://137.189.51.115/igem/images/stories/raid.png" /></p>
+
-
<p>Incorporating a short message is not our purpose, instead we are pursuing for a true massively parallel storage system that one can systematically incorporate useful information neglecting its size.</p>
+
-
<p>In order to store a large piece of information such as a photograph or a dictionary, it is impossible to include it within a single piece of DNA as this is limited by the current DNA synthesis technology. One approach is to fragment the information into pieces and insert them into the cells. However simply fragmenting the information followed by insertion to the cell would destroy all the data, as the order of these fragments is unknown. To overcome such an obstacle, a novel information system was invented. Each sequence that we are inserting into the bacterial cell composes of three sectors – Headers, Messages and Checksum. Header is the address of that particular message fragment, which consist of 8 DNA bases with each 2 bases as one unit – namely zone, region, area and district. The message is self-explanatory – the message fragment itself and the checksum is an identification and correction system for minor mutations.</p>
+
-
<p><h3>Decryption</h3></p>
+
-
<p>Decryption is not simple,  it consists of a three-tier security fencing – encoding system, encryption system and checksum system, the message could only be retrieved when enough information is provided. Here shows the design of a single data fragment:</p>
+
-
<p><img src="http://137.189.51.115/igem/images/stories/msg.png" /></p>
+
-
<p>The full message can be restored from data fragments through a series of steps:</p>
+
-
<p><h5>Step 1 : next generation high-throughput sequencing (NGS) and assembling</h5></p>
+
-
<p>With the information-encrypted bacteria provided, the plasmid DNA would be extracted and subjected to next-generation high-throughput sequencing (NGS). A reason to choose high-throughput sequencing instead of ordinary sequencing technology would be NGS is a massively parallel sequencing process, which means there must exist multiple copies of sequencing products (reads) that could cover a particular message stored within the DNA, these multiple copies of reads could enable us to perform a majority voting on bases for which qualities are not the best. Moreover with the current reads assembling algorithms available – velvet and euler for example, assembling the reads from NGS is no longer a formidable task.</p>
+
-
<p><h5>Step 2 : Identification of repeat sequences, messages and checksum</h5></p>
+
-
<p>The second tier, with the given encryption system – like R64 shufflon system in this case, the repeats are known. The repeats could be recovered by using alignment tools such as BLAST and the sequences in between the repeats would be regarded as the fragment of messages, with unknown order however. The checksum is right behind the last repeat sequence.</p>
+
-
<p><h5>Final Step : Combinatorial problem</h5></p>
+
-
<p>The third tier, only the client would know the function to derive the checksum. With the checksum formula, we are just one step before reaching our goal – recovering the correct message. With different fragments of messages provided, they are concatenated in different permutations; fit the trial into the checksum formula, compare with that on the sequence and BINGO if they are the same, or if not one would have to try again.</p>
+
<div class="article-ratings">
<div class="article-ratings">
Line 582: Line 556:
</body>
</body>
-
<!-- Mirrored from 137.189.51.115/igem/project/principle by HTTrack Website Copier/3.x [XR&CO'2010], Wed, 27 Oct 2010 18:06:52 GMT -->
+
<meta http-equiv="content-type" content="text/html;charset=utf-8">
-
<!-- Added by HTTrack --><meta http-equiv="content-type" content="text/html;charset=utf-8"><!-- /Added by HTTrack -->
+
</html>
</html>

Revision as of 18:28, 27 October 2010

Project

Project

CUHK iGEM 2010 team is formed by a group of undergraduates and instructors from the Chinese University of Hong Kong. Our project is to create a brand new biological cryptography system. We harness the incredible adaptability of simple organisms in the tortured environment to make sure that the message stored can be left undisturbed regardless of any environmental changes. Employing a specially people are denied access to obtain the information.

Quick fact: 

In our system, 1g of E. coli can store max 931,322 GB data. 

In comparison, typical hard disk can store 1-4GB/gram.

As the leakage of national confidential information and personal privacy become more and more serous, we believe that this biological cryptography can help protect the important information of the mankind. The innovative cryptography system heralds a new era of information security.

Back to top

 

T

his year in the iGEM 2010 competition, we will use bacteria not only as a biological data storage unit but also to integrate an intrinsic encryption system with it.

With the advancement of electronic engineering after the World War II, more complex ciphers are developed, which plays a pivotal role in the security system of this information explosive age. However mathematical advances result in the weakening or even attack on the ciphers. It makes us rethink whether data storage and encryption in computer is the only way to ensure data safety

Using bacteria as the information storage device is not a new idea, Bancroft’s group [1] had long proposed the storage of information in DNA early in 2001. Yachie’s group[2] had also been working on the bacterial data storage method in Bacillus subtilis in 2007. In contrast to electronic data storage, the nature of bacterial data storage depends on the bacteria one would pick – Bacillus subtilis would create extra copies of the data, inserting into their genomes which would further safeguard the information; Deinococcus radiodurans, one of the most radioresistant organisms known, would survive even under the electromagnetic pulse and radiation after the nuclear attack. But how are we actually improving the security system by simply storing information in bacteria?

Next: Principle