dna computing final part

Upload: charu73

Post on 04-Jun-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Dna Computing final part

    1/6

    10.Applications

    Massively Parallel Processing-Basically any problem that can be turned into aHamiltonian problem and other complex problems can be solved.

    Storage and Associative Memory-A truly content addressable memory occurs when adata entry can be directly retrieved from storage by entering an input that most closely

    resembles it over other entries in memory. This contrasts with a conventional

    computer memory, where the specific address of a word must be known to retrieve it.

    DNA computers could fight cancer-New computers made of biological moleculesthat react to DNA hold the promise to diagnose and treat diseases such as cancer by

    operating like doctors inside the body, Israeli scientists said.[8]

    DNA2DNA Applications-Another area of DNA computation exists whereconventional computers clearly have no current capacity to compete. This is the

    concept of DNA2DNA computations such as DNA sequencing; DNA fingerprinting;

    DNA mutation detection or population screening; and Other fundamental operations

    on DNA.

    Implications to Biology, Chemistry, and Medicine-A particular area within the naturaland applied sciences that may benefit from advances in DNA computation is

    combinatorial chemistry.

    DNA's Role in Computer Science- DNA based computers may postpone certainexpected thermodynamic obstacles to computation as well as questioning theories of

    computation based on electronic and mechanical models.

    This can be quite useful in figuring out how to route telephone calls, plane trips. It is also been claimed that DNA can be used to solve optimization problems

    involving business management.

    It is even said that DNA can be used in devising the wiring schematics for circuits. DNA computers can be used to control chemical and biological systems in a way

    thats analogous to the way we use electronic computers to control electrical and

    mechanical systems.

  • 8/13/2019 Dna Computing final part

    2/6

    Another application being mentioned nowadays is that DNA computing can docryptography. [2,5] It is used in various security applications

    10.1 DNA Cryptography

    The DNA cryptography is a new and very promising direction in cryptography research.

    DNA can be used in cryptography for storing and transmitting the information, as well as for

    computation. Here we try to utilize the power of DNA to hide message.

    Ashish Gehani, Thomas LA Bean and John Reif of Duke University have published a paper

    entitled DNA-based Cryptography [5] which puts an argument forward that the high level

    computational ability and incredibly compact information storage media of DNA computing

    has the possibility of DNA based cryptography based on one time pads. They argue that

    current practical applications of cryptographic systems based on one-time pads is limited to

    the confines of conventional electronic media whereas as small amount of DNA can suffice

    for a huge one time pad for use in public key infrastructure (PKI). To put this into terms of

    the common Alice and Bob description of secure data transmission and reception, they are

    basing their argument of DNA cryptography on Bob providing Alice his public key, and

    Alice will use it to send an encrypted message to him. The potential eavesdropper, Eve, will

    have an incredible amount of work to perform to attempt decryption of their transmission

    than either Alice or Bob.

    Public key encryption splits the key up into a public key for encryption and a secret key for

    decryption. It's not possible to determine the secret key from the public key. Bob generates a

    pair of keys and tells everyone his public key, while only he knows his secret key. Anyone

    can use Bob's public key to send him an encrypted message, but only Bob knows the secret

    key to decrypt it. This scheme allows Alice and Bob to communicate in secret without havingto physically meet as in symmetric encryption methods.

    Injecting DNA cryptography into the common PKI scenario, the researchers from Duke argue

    that we have the ability to follow the same inherent pattern of PKI but using the inherent

    massively parallel computing properties of DNA bonding to perform the encryption and

    decryption of the public and private keys. In essence, the encryption algorithm used in the

    transaction can now be much more complex than that in use by conventional encryption

    methods. [10]

  • 8/13/2019 Dna Computing final part

    3/6

    Method to encrypt the plaintext using DNA, so that it could be send securely over a

    network.

    Encryption

    Step1:The binary data, text or image, is used under the form of ASCII code (in decimal

    format).

    Step2:These numbers are then grouped in blocks and encrypted in using a traditional method

    (eg. DES, will form a 2 level encryption).

    Step3:This encoded message is then changed to binary format.

    Step4: Then these digits are grouped into two and substituted as A for 00, T for 01, G for 10,

    and C for 11.

    Step5: We then fit the primers on either side of this message. Primers will act as stoppers and

    detectors for the message. This has to be given to the receiver prior to the communication.

    Step6: This message is followed by our own DNA sequence followed by another

    stopper/primer.

    Step7: This message is then flanked by many sequences of DNA or by confining it to a

    microdot in the micro-array.

    Step8: If considered as a pseudo method: this sequence is transferred to the receiver through

    the Internet. Else the micro-array is sent physically (though time consuming).

    Decryption

    This message can then be recovered only by an intended recipient who both can find it, and

    who knows the sequences of the PCR primers employed, and also the encryption key (2 level

    encryption used). For this method:

    Step1. The DNA sequence is searched for the primers (start primer and end primer). The

    message in-between them is retrieved and the next DNA sequence before the next primer (our

    DNA) is retrieved.

    Step2. The ATGC characters are substituted accordingly (00,01,10,11 respectively). Step3.

    They are then converted into ASCII code and then the message is retrieved.

    10.2 DNA Steganography

  • 8/13/2019 Dna Computing final part

    4/6

    Experiments in DNA Steganography have been conducted by Carter Bancroft and his team at

    the Mt. Sinai School of Medicine to encrypt hidden messages within microdots.

    The principles used in this experiment used a simple code to convert the letters of the

    alphabet into combinations of the four bases which make up DNA and create a strand of

    DNA based on that code. A piece of DNA spelling out the message to be hidden is

    synthetically created which contains the secret encrypted message in the middle plus short

    marker sequences at the ends of the message. The encoded piece of DNA is then placed into

    a normal piece of human DNA which is then mixed with DNA strands of similar length.

    The mixture is then dried on to paper that can be cutup into microdots with each dot

    containing billions of strands of DNA. Not only is the microdot difficult to detect on the

    plain message medium but only one strand of those billions within the microdot contains the

    message.

    The key to decrypting the message lies in knowing which markers on each end of the DNA

    are the correct ones which mean there must be some sort of shared secret that is transmitted

    previously for this type of transmission to work successfully. Once the strand is determined

    via identifying the markers, the recipient uses polymerase chain reaction to multiply only the

    DNA which contains the message and applies the simple code to finally decode the true

    message. [2] Utilizing these methods, Bancroft and his team were successfully able to

    encode and decode the famous message June 6 Invasion: Normandy within a microdot

    placed in the full stops on a posted typed letter. [11]

    The DNA microdot team does see this technology having applications in another field

    however that of authentication. With the amount of plant and animal genetic engineering

    that is taking place today and will continue to do so in the future, this methodology would

    allow engineers to place DNA authentication stamps within organisms they are working with

    to easily detect counterfeits or copyright infringements.

    10.3 DNA Authentication

    It is worth mentioning that DNA authentication is currently at work in the marketplace today

    albeit not in the genetic engineering form envisioned by Bancroft and his team. Forms of

  • 8/13/2019 Dna Computing final part

    5/6

    DNA authentication have already been used for such items as the official clothing from the

    Sydney Olympic Games, sports collectibles and limited edition art markets such as original

    animation cells distributed by the Hanna Barbara group of artists.

    In the case of the clothing used in the Sydney Olympic Games, a Canadian company named

    DNA Technologieswas able to showcase its DNA-tagging abilities on the world stage in the

    summer of 2000. All Olympic merchandise from shirts and hats to pins and coffee mugs

    were tagged with special ink that contained DNA taken from an unnamed Australian athlete.

    DNA was taken via saliva samples from the athlete and mixed into existing ink compounds

    which was in turn used in the regular merchandise manufacturing process. A hand held

    scanner is then used to scan the inked area of the clothing to determine if a piece of

    merchandise is authentic or not. As it is estimated that the human genome is roughly 3

    billion base pairs in size, and the samples taken were from a random athlete from a Olympic

    team of hundreds, the possibility of counterfeiting this merchandise is difficult to say the

    least. For the Sydney games, DNA inks were applied too nearly 50 million items at a cost

    of about five cents each, including licensing, databasing , and back-end support.

    There are possibilities of this type of technology to be used in the arenas of currency and

    other such brandable items where existing authentication methods such as holograms are

    proving ineffective and costly. DNA-tagging is much cheaper in comparison and ultimately

    more difficult to thwart.

    11.Future Scope

  • 8/13/2019 Dna Computing final part

    6/6

    Its different way of thinking about computing. Its different way of thinking about

    chemistry, says Dr. Corn, a chemistry professor at the University of Wisconsin at Madison

    who is collaborating on a DNA-computer project with three other Madison faculty members:

    Lloyd M. Smith, a chemistry professor, Max G. Lagally, a materials-science professor, and

    Anne E. Condon, a computer science professor.

    The Wisconsin approach would use the gold-plated square of glass as something akin (related

    blood) to a conventional memory chip. As many as a trillion individual strands of DNA

    would be anchored (fixed firmly) to the glass, each strand containing information being

    stored in the DNA computer.

    A rival approach, pioneered by Leonard M. Adleman allows the bits of DNA to float freely in

    a test-tube. Dr. Adleman, in 1994 solved the traveling salesman problem using his test-tube

    approach. The TSP on a large scale is effectively unsolvable by conventional computer

    systems (its theoretically possible, but wouldtake an extremely long time).

    His work was picked up by Dr. Donald Beaver, among others, who analyzed the approach

    and organized it into a highly accessible web page which includes concise annotated

    bibliography. One major contributor to this page is the research group of Dr. Richard Lipton,

    Dan Bonech and Christopher Dunworth-a professor of computer science and two graduate

    students at Princeton University. They are currently using a DNA computer to break the

    governments DES.

    In Liptons article speeding upcomputation via molecular biology he shows how DNA can

    be used to construct a Turing machine, a universal computer capable of performing any

    calculation. While it currently exists only in theory, its possible that in years to come

    computers based on work of Adleman, Lipton, and others will come to replace traditional

    silicon-based machines.

    In other words of Dr. Goodman its clearly theoretically possible, the question is whether

    the chemical operations can actually be done with a low-enough error frequency.