Team:Hong Kong-CUHK/Project
From 2010.igem.org
(Difference between revisions)
(2 intermediate revisions not shown) | |||
Line 325: | Line 325: | ||
<!--Begin Logo--> | <!--Begin Logo--> | ||
<div class="logo-module"> | <div class="logo-module"> | ||
- | <a href=" | + | <a href="https://2010.igem.org/Team:Hong_Kong-CUHK" id="logo"></a> |
</div> | </div> | ||
<!--End Logo--> | <!--End Logo--> | ||
Line 364: | Line 364: | ||
<p><span class="inset-right">Quick fact: <br /><br />In our system, 1g of <em>E. coli</em> can store max 931,322 GB data. <br /><br />In comparison, typical hard disk can store 1-4GB/gram.</span></p> | <p><span class="inset-right">Quick fact: <br /><br />In our system, 1g of <em>E. coli</em> can store max 931,322 GB data. <br /><br />In comparison, typical hard disk can store 1-4GB/gram.</span></p> | ||
<p>As the leakage of national confidential information and personal privacy become more and more serous, we believe that this biological cryptography can help protect the important information of the mankind. The innovative cryptography system heralds a new era of information security.</p> | <p>As the leakage of national confidential information and personal privacy become more and more serous, we believe that this biological cryptography can help protect the important information of the mankind. The innovative cryptography system heralds a new era of information security.</p> | ||
- | |||
<p> </p> | <p> </p> | ||
<p><span class="dropcap-blue">T</span></p> | <p><span class="dropcap-blue">T</span></p> | ||
Line 370: | Line 369: | ||
<p>With the advancement of electronic engineering after the World War II, more complex ciphers are developed, which plays a pivotal role in the security system of this information explosive age. However mathematical advances result in the weakening or even attack on the ciphers. It makes us rethink whether data storage and encryption in computer is the only way to ensure data safety</p> | <p>With the advancement of electronic engineering after the World War II, more complex ciphers are developed, which plays a pivotal role in the security system of this information explosive age. However mathematical advances result in the weakening or even attack on the ciphers. It makes us rethink whether data storage and encryption in computer is the only way to ensure data safety</p> | ||
<p>Using bacteria as the information storage device is not a new idea, Bancroft’s group [1] had long proposed the storage of information in DNA early in 2001. Yachie’s group[2] had also been working on the bacterial data storage method in Bacillus subtilis in 2007. In contrast to electronic data storage, the nature of bacterial data storage depends on the bacteria one would pick – Bacillus subtilis would create extra copies of the data, inserting into their genomes which would further safeguard the information; Deinococcus radiodurans, one of the most radioresistant organisms known, would survive even under the electromagnetic pulse and radiation after the nuclear attack. But how are we actually improving the security system by simply storing information in bacteria?</p> | <p>Using bacteria as the information storage device is not a new idea, Bancroft’s group [1] had long proposed the storage of information in DNA early in 2001. Yachie’s group[2] had also been working on the bacterial data storage method in Bacillus subtilis in 2007. In contrast to electronic data storage, the nature of bacterial data storage depends on the bacteria one would pick – Bacillus subtilis would create extra copies of the data, inserting into their genomes which would further safeguard the information; Deinococcus radiodurans, one of the most radioresistant organisms known, would survive even under the electromagnetic pulse and radiation after the nuclear attack. But how are we actually improving the security system by simply storing information in bacteria?</p> | ||
- | <p><a href=" | + | <p><a href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_principle">Next: Principle</a></p> |
<div class="article-ratings"> | <div class="article-ratings"> |
Latest revision as of 21:24, 27 October 2010