Difference between revisions of "Team:Edinburgh UG/Encryption"

Line 543: Line 543:
 
             <p><strong>Scenario #1:</strong> When you decode your DNA, you are hacked and the data is stolen…</p>
 
             <p><strong>Scenario #1:</strong> When you decode your DNA, you are hacked and the data is stolen…</p>
 
             <p>After retrieving your DNA sequencing results, you will input this back into our software for decoding. As your computer will most likely be connected to the internet, it is entirely possible for someone to steal your data during decode. </p>
 
             <p>After retrieving your DNA sequencing results, you will input this back into our software for decoding. As your computer will most likely be connected to the internet, it is entirely possible for someone to steal your data during decode. </p>
             <p>Scenario #2: You have sequenced your DNA. Before you manage to decode the sequence, someone else gets a hold of it…</p>
+
             <p><strong>Scenario #2:</strong> You have sequenced your DNA. Before you manage to decode the sequence, someone else gets a hold of it…</p>
 
             <p>Similar to the situation above, it is possible that if your sequencing results are being sent to you online they could be intercepted or the file on your computer may be hacked. Our encryption system ensures that only those with the correct key will be able to decode the DNA sequence to the original data. </p>
 
             <p>Similar to the situation above, it is possible that if your sequencing results are being sent to you online they could be intercepted or the file on your computer may be hacked. Our encryption system ensures that only those with the correct key will be able to decode the DNA sequence to the original data. </p>
             <p>Scenario #3: You want to send confidential data to someone, how can you prevent the message from being intercepted?</p>
+
             <p><strong>Scenario #3:</strong> You want to send confidential data to someone, how can you prevent the message from being intercepted?</p>
 
             <p>In the spirit of iGEM, our software and procedures will be open source. This means that if you were to send a DNA message to a friend, it would be possible to intercept the message and decode it using our systems.</p>
 
             <p>In the spirit of iGEM, our software and procedures will be open source. This means that if you were to send a DNA message to a friend, it would be possible to intercept the message and decode it using our systems.</p>
 
             <p> A conversation with FBI Special Agent Edward You pointed out to us the importance of security in modern information transfer; in order for our method to be utilised by both private individuals and large scale companies, we need to incorporate a method of encryption that restricts decoding. Even archival data that is stored for long periods of time should have some level of encryption.</p>
 
             <p> A conversation with FBI Special Agent Edward You pointed out to us the importance of security in modern information transfer; in order for our method to be utilised by both private individuals and large scale companies, we need to incorporate a method of encryption that restricts decoding. Even archival data that is stored for long periods of time should have some level of encryption.</p>
Line 567: Line 567:
 
                         <div class="row">
 
                         <div class="row">
 
                             <div class="col-lg-12 text-center">
 
                             <div class="col-lg-12 text-center">
                                 <h2 class="section-heading">Introduction</h2>
+
                                 <h2 class="section-heading">Overview of Encryption</h2>
 
                                 <h11 class="section-subheading text-muted">
 
                                 <h11 class="section-subheading text-muted">
                                  Nowadays, security constitues a very big issue and need for all your devices, app, computers and so on. Also, for our system.The reason behind why we want to encrypt our data is that on a large scale, meaning a lot of people are using our system and algorithms to encode and decode text, the information might get stolen. The algorithms and procedure will be open source, so everyone can have access to it. In this case, if you send a DNA message to a friend, someone can steal it, decode it and visualize the information provided. In the case of shipping information in DNA, it is quite risky if another party finds out about it.
+
                                <p> We are using two methods for encrypting our DNA: Stream Cipher and RSA. RSA is a form of public-private key encryption, and ensures that when transferring information, only the intended party is capable of decoding the DNA. The public key from RSA is used to encrypt the DNA using a stream cipher; meaning that each BabbleBlock will be encrypted differently, based on the public key. The message can then only be decoded with the public key’s corresponding private key.</p>
            Our main usages of storing text into DNA are: storing data as archive and sending DNA messages. We consider that in both cases if the DNA is stolen most people with a biology lab can decrypt the message.
+
 
+
            <br>
+
            <br>
+
 
             <br>
 
             <br>
 
             <br>
 
             <br>
            Another threat can be discovered at the stage when the user wants to decode the DNA sequence into text. Because at this stage your DNA is into a computer which is linked to a network, the risk is quite high of being stolen. We indeed see that the system requests some security measures in order to keep data safe.
+
                                <div class="col-lg-12">
            In conclusion, the ‘threat’ is someone stealing the information when the DNA is sent to a different person or the archive data. In this way, the value of the data might be of high importance, so we need to find a way of protecting it, because our stored data needs to be secure.</h11>
+
                                <div class="featurette" id="contact">
 +
                                <img class="featurette-image img-responsive img-center" src="https://static.igem.org/mediawiki/2016/9/97/Security.jpg">
 +
                                </div>
 +
            </h11>
 
                             </div>
 
                             </div>
 
                             <div align="center">
 
                             <div align="center">

Revision as of 13:59, 15 October 2016

Loading menubar.....

Team:Edinburgh/Part Collection

Introduction

Storing information isn’t as simple as finding a place to put it until you need it. The growth of digital information storage and transfer has also come with an increased demand for security and encryption. When we set out to design our modular DNA data storage system, we immediately thought of the question; is it possible to encrypt our DNA?







Why encrypt?

Imagine you have just used our software to encode your data into BabbleBlocks….





Scenario #1: When you decode your DNA, you are hacked and the data is stolen…

After retrieving your DNA sequencing results, you will input this back into our software for decoding. As your computer will most likely be connected to the internet, it is entirely possible for someone to steal your data during decode.

Scenario #2: You have sequenced your DNA. Before you manage to decode the sequence, someone else gets a hold of it…

Similar to the situation above, it is possible that if your sequencing results are being sent to you online they could be intercepted or the file on your computer may be hacked. Our encryption system ensures that only those with the correct key will be able to decode the DNA sequence to the original data.

Scenario #3: You want to send confidential data to someone, how can you prevent the message from being intercepted?

In the spirit of iGEM, our software and procedures will be open source. This means that if you were to send a DNA message to a friend, it would be possible to intercept the message and decode it using our systems.

A conversation with FBI Special Agent Edward You pointed out to us the importance of security in modern information transfer; in order for our method to be utilised by both private individuals and large scale companies, we need to incorporate a method of encryption that restricts decoding. Even archival data that is stored for long periods of time should have some level of encryption.



Overview of Encryption

We are using two methods for encrypting our DNA: Stream Cipher and RSA. RSA is a form of public-private key encryption, and ensures that when transferring information, only the intended party is capable of decoding the DNA. The public key from RSA is used to encrypt the DNA using a stream cipher; meaning that each BabbleBlock will be encrypted differently, based on the public key. The message can then only be decoded with the public key’s corresponding private key.