Design
Our iGEM team is dedicated to DNA encryption and storage of information and secret communication. The following four levels describe our topic and compare it with previous technologies.
1. The first encryption level is the combination of DNA encryption and computer technology. How do you translate that information into the sequence of DNA (ATCG)? We adopted the method corresponding to the password table or further strengthened combined with computer science. We also designed a 4W (who, where, when, what) one-step information assembly method similar to golden gate.
2. The second level is the application of steganography. Clelland et al. first used biosteganalysis to hide a meaningful piece of DNA in genomic DNA, then decoded it by polymerase chain reaction (PCR) using a pair of primers (keys), and then sequenced. We also tested this.
3. The third level is encryption or steganography of the secret key (in this case, the Primer) itself. (1) Encryption: we perform asymmetric secret key encryption similar to computer Encryption on two primers.(2) Steganography: on the basis of CADS method (long primers), add more complex information interference items, including single and double stranded DNA, etc.
4. The fourth level is the preservation of DNA. The DNA is stored on paper, making it harder for a thief to decipher. As far as I know, this is the first time DNA has been used for encryption on paper.
◦ Cloning
▶ The process of transformation
▶ Blue white screening
▶ Checking the bacteria
◦ Principle
◦ Encryption
▶ Physical protection
▶ DNA sequence
▶ Mixed primer
▶ Mixed information
▶ Computer encoding
◦ Contrast
Cloning+transformation
the experiment is designed to obtain and confirm the right DNA segment in a situation where the segments are mixed; and cloning is where it starts. E-Coli (DH5a) bacteria is chosen to be plasmid in the experiment due to its stability and the fact that it's easier to duplicate. The right and wrong DNA segments, known as connection products are injected into the E-Coli which is known as competence. Subsequently, in order to provide a comfort environment for E-coli to coalesce with the DNA segments, this mixed products first is placed on the ice for 30 mins, then through a 90s of thermal excitation at 42˚c to form small pores for the segments to enter smoothly. Next, we place the added E-Coli in a 37˚c environment with continually
gentle shaking for 45 minutes, due to the reason that E-Coli was fragile originally, providing a comfy circumstance can activate the growth of E-Coli. After the waiting, placing the reagent on the Petri dish in a relative sterile working space, leaves E-Coli to grow overnight.
figure 2: the demonstration of how blue-white screening work
Blue- white screening:
The blue-white screening technique is a method to separate the ones contain DNA segments and ones that's not and the wrong ones. In our experiment if E-Coli is connected to the right DNA segments, the dots will be white, which is the color of E-Coli itself. Whereas, if the colored dot is blue, which is a indicator of inactivation, it means either E-coli didn't connect to any segments or the wrong ones. However, there is exception, which E-Coli connected to both the right and wrong segments, in order to increase the chance of getting the right DNA segments, we picked out 64 single white bacterial colonies as samples for use to test, which is not touched with other colonies due to the reason that just single colony contains millions of bacterias and accuracy.
figure 3 is the process of PCR and components
The process of checking contains two parts, PCR (polymerase chain reaction) and electrophoresis. PCR is a method to get large number of copies of segments through the changes of temperature in the PCR machines. The process is a preparation for electrophoresis, since the segments will show as bars in the electrophoresis machine, and the larger the number the more clear it can be see in the graph.
figure 4, an example of electrophoresis graph/bar
electrophoresis:
Electrophoresis is a way that involved the migration and the separation of the charged ions under the influence of electric current. The method relates to a fuhkd under the influence of the spatial electric field(positive and negative), which will separated the particles which the positive ones will attracted too one side, while negative particles will be on the other side.
In our project, five methods are mixed to protect the information. The first layer is physical protection, which is on the paper; DNA is invisible. Therefore, if no one tell you there is DNA on this paper, it's not easy to find DNA reagent. The second layers is the DNA sequence, DNA (Deoxyribonucleic acid) is made up of molecules called nucleotides, which contains a phosphate group, a sugar group and a nitrogen group. The four types of nitrogen group are adenine(A), thymine(T), guanine(G) and cytosine(C). The order of these badges is determined by the DNA’s instruction. Three nitrogen bases will form codon, which will represent a letter or number on the keyboard.
Then we will employ those codon formed letter to write a message which will form a sequence.
Making our information more complex and safe, we will add mixed letters (nitrogen bases) in the sequence. The next step is to add primer, which will be applied to decode the mixed information, in the reagent. However, if we only contain one primer that will be too easy to solve, more primers(fake and the real) will annex in the regents. With will the pieces of information and primers, eventually it will be coded in the computer.
How to obtain the right information?
Due to the complication of this reagent, this mixed sequence will be sent to scientific laboratory to resolve, which will require special protein, Cas12a, to mixed with the crRNA and primers after decoding through the computer. Under the special characteristics of Cas12a, which will protect the main information and cut the useless information out with the primers and crRNA. The information will be extract through right portion of Cas12a, and crRNA.
Our technique is an more advanced technique to conserve information than other others. The original method that most people are using today is to mix DNA with the 293T (junk information) together, which will be replicate multiple times; and whoever is getting the information can use the primer(short nucleic acid sequence that provides a starting point for DNA synthesis) to match the primer with information and obtain informations. Yet, this method isn't secured anymore since a hacker can employ the primer to get the information directly, but our method is safer since few complicated methods are mixed together to set obstacles for the people who not suppose to obtain this information.
Key Reference
Li, S. Y.; Liu, J. K.; Zhao, G. P.; Wang, J., CADS: CRISPR/Cas12a-Assisted DNA Steganography for Securing the Storage and Transfer of DNA-Encoded Information. ACS synthetic biology 2018, 7 (4), 1174-1178.
Reference
1 Carlson, R. The changing economics of DNA synthesis. Nature biotechnology 27, 1091 (2009).
2 Medini, D. et al. Microbiology in the post-genomic era. Nature Reviews Microbiology 6, 419-430 (2008).
3 Carr, P. A. & Church, G. M. Genome engineering. Nature biotechnology 27, 1151-1162 (2009).
4 Bornholt, J. et al. A DNA-Based Archival Storage System. 637-649, doi:10.1145/2872362.2872397 (2016).
5 Castillo, M. From hard drives to flash drives to DNA drives. AJNR Am J Neuroradiol 35, 1-2, doi:10.3174/ajnr.A3482 (2014).
6 Cox, J. P. Long-term data storage in DNA. TRENDS in Biotechnology 19, 247-250 (2001).
7 Bancroft, C., Bowler, T., Bloom, B. & Clelland, C. T. Long-term storage of information in DNA. Science 293, 1763-1765 (2001).
8 Erlich, Y. & Zielinski, D. DNA Fountain enables a robust and efficient storage architecture. Science 355, 950-954, doi:10.1126/science.aaj2038 (2017).
9 Church, G. M., Gao, Y. & Kosuri, S. Next-generation digital information storage in DNA. Science 337, 1628, doi:10.1126/science.1226355 (2012).
10 Goldman, N. et al. Towards practical, high-capacity, low-maintenance information storage in synthesized DNA. Nature 494, 77-80, doi:10.1038/nature11875 (2013).
11 Ball, P. Material witness: Gene memories. Nat Mater 16, 393, doi:10.1038/nmat4887 (2017).
12 Marwan, S., Shawish, A. & Nagaty, K. DNA-based cryptographic methods for data hiding in DNA media. Biosystems 150, 110-118, doi:10.1016/j.biosystems.2016.08.013 (2016).
13 Brunet, T. D. Aims and methods of biosteganography. J Biotechnol 226, 56-64, doi:10.1016/j.jbiotec.2016.03.044 (2016).
14 Kar, N., Majumder, A., Saha, A., Deb, S. & Pal, M. C. Data security and cryptography based on DNA sequencing. International Journal of Information Technology & Computer Science (IJITCS) 10 (2013).
15 Gao, Q. BioCryptography. Journal of Applied Security Research 5, 306-325 (2010).
16 Clelland, C. T., Risca, V. & Bancroft, C. Hiding messages in DNA microdots. Nature 399, 533-534, doi:10.1038/21092 (1999).
17 Tanaka, K., Okamoto, A. & Saito, I. Public-key system using DNA as a one-way function for key distribution. Biosystems 81, 25-29, doi:10.1016/j.biosystems.2005.01.004 (2005).
18 Zakeri, B., Carr, P. A. & Lu, T. K. Multiplexed Sequence Encoding: A Framework for DNA Communication. PLoS One 11, e0152774, doi:10.1371/journal.pone.0152774 (2016).
19 Halvorsen, K. & Wong, W. P. Binary DNA nanostructures for data encryption. PLoS One 7, e44212, doi:10.1371/journal.pone.0044212 (2012).
20 Leier, A., Richter, C., Banzhaf, W. & Rauhe, H. Cryptography with DNA binary strands. Biosystems 57, 13-22 (2000).