Jurnal Resveratrol
Jurnal Resveratrol
Jurnal Resveratrol
ABSTRACT
Recent research has considered DNA an interesting medium for long-term and ultra compact
information storage and a stegomedium for hidden messages. Artificial components of DNA
with encoded information can be added to the
genome of living organisms, such as common
bacteria. With this approach, a medium for very
height densities information storage, watermarks for protection patents of genetically modified organisms (GMOs) and secure public
keys for decrypting hidden information in steganocryptography, can be obtained. In this paper,
we have selected a Bacillus subtilis gene (tatAD)
and use the specific properties of silent mutations to obtain a biologically innocuous product.
An adapted code for the message insertion in
this gene is proposed.
1. INTRODUCTION
There has been growing interest in using DNA to store
information, one the main reasons being the very high
storage densities that can be achieved. The durability
of DNA would make it particularly useful for preserving
archival material over extensive periods of time (longterm storage). Message DNA has been used in computations in biologic mathematics, in steganography and as a
mean of short-term trademarks. These different fields
use the specific properties of genetic code and the possibilities to encode artificial information.
However, the artificial introduction of a new gene or the
modification of an existing gene in the DNA of a living
organism, can involve prejudicial deterioration of the behavior and the reproduction of this species. The solution suggested must thus notably allow a great computer security,
but also the genetic consequences of their implementation.
U A and G C
Messenger RNA (mRNA) carries all the genetic information to ribosome for proteins synthesis by the cell.
A codon is a triplet of three bases (T,C,A and G). With
these four letters, 4364 combinations are possible. With
three exceptions, each codon encode for one of the 20
amino acids, used in the proteins synthesis (the three exceptions are TAA, TAG and TGA: codons STOP).
ATG correspond at methionine within the gene; at the
beginning of the gene, ATG is also a signal START. Ribosome assembles individual amino acids into peptide chains.
Peptides are short chains of amino acids that are linked
together. If the number of amino acids in the chain reaches
around ten or more, such substances are called polypeptides and large polypeptides are called proteins.
182
5. CHOICE OF SITE
6. IMPLEMENTATION
6.1. Encryption
By example, we consider the message CODING. After
translation with ASCII code (with 8 bits per character), this
message requires 48 bits.
C01000001
O01001111
D01000100
I01001001
N01001110
G01001111
With the rate of 2 bits per codon, this message requires
24 codons. For his implementation, only 35 codons are
selected (codons underlined).The beginning and the end of
this message necessarily belongs to these 35 codons, so
that only two 6 bits numbers (two times three codons) are
needed for their localization.
If we assume that the beginning is located at the 9th
codon, and is 48 bits long (24 codons), the end of the message will be located at 32 th codon.
Beginning at 9 00 10 01
End at 32 01 00 00
Six codons are needed for their localization.
/1 2 3/-//4 5 6//7 8///9 10 11 12 13 14 15 16 17 18 19 20 21
22 23 24 25 26 27 28 29 30 31 32///33 34 35.
The coding consists in replacing the 3rd base of these
codons by A, C, G, T according this table:
A if 00 C if 01
G if 10 T if 11
Before coding we, in the first line have
ATG TTT TCA AAC ATT GGA ATA CCG GGC TTG
ATT CTC ATC TTC GTC
After coding we obtain:
ATG TTT TCA AAC ATT GGG ATA CCC GGG TTG
ATT CTA ATC TTC GTA
The first 24 codons selected on the short list are:
CCT TCC CTC CCG GGG CGT
GCC GCC CGG ACA CTG CTG
SciRes Copyright 2009
183
6.2. Decryption
Decryption is particularly easy. After obtaining the beginning and the end of the message from the first 6 codons of
the shortlist, it is sufficient to replace, in the sequence of
codons corresponding to the message, the last base of each
codon by its equivalent in bits:
(A00, C01, G10, T11)
In this example, a very short gene is used for demonstration purposes, but this method can be applied to longer
genes, that are more than 10000 base pairs long (such as
the gene srfAA de Bacillus subtilis) which then allows the
insertion of messages 50 that are time longer (~2400 bits
and therefore 300 ASCII characters).
184
TCA CAC G GA G G C C CA C C C
Ser His Gly Gly Pro Pro
new peptidic chain. With the chain we can retrieve the
three codons of the short list
For this, it is sufficient to conserve uniquely two
bases/in each codon.
T C C A G G G G C C C C and to regroup:
TC GG CC
CA GG CC
TCA GGG CC C
for obtain the three original codons.
7.2. Complements
It is possible to associate this encryption method with
a binary encryption algorithm (AES, RSA, Blowfish). In this case, the inserted message is not the clear
version, but a secure version after using these specific algorithms.
8. CONCLUSIONS
The use of the degeneracy of the genetic code and, in particular, the silent mutations, produces coding that does not
practically alter the properties of the inserted gene, nor the
characteristics of the host genome (very important conditions when we working with the live organisms). Memorization of the key information and the production of the
hidden message in the form of a physical polypeptide provide additional data transfer security, while the coding
protocol is being implemented).
DNA is a storage medium extremely effective: it is compact and his signature is innocuousness and secrecy. In the
spore form, Bacillus subtilis is resistant to extremes terrestrial and extraterrestrial environment during the interstellar
travel, for example (ref 10). In the nearly future, this bioengineering method can be used in routine, for protection
of the gene patents, digital copyrights and tool for the
marking in biodiversity
REFERENCES
[1]