Difference between revisions of "Team:Groningen/Experiments"

Line 8: Line 8:
 
 
 
<p>The biological realization of CryptoGErM consisted of four  
 
<p>The biological realization of CryptoGErM consisted of four  
subprojects: integration, characterization, decoy and key deletion.</p>
+
subprojects: integration, characterization, key hiding and key deletion.The location in the genomic DNA makes it harder to retrieve the
 +
data, since whole genome sequencing is required. The message is
 +
protected by a digital lock: the key, and thus doesn’t need further
 +
biological protection. The key is not encrypted and has to be protected by a biological
 +
lock. We followed different approaches to design a multi-layered
 +
biological lock. We followed two main ideas, namely hiding the key and deleting
 +
the key when unauthorized parties handle it.</p>
 
 
 
<div class="split">
 
<div class="split">
Line 25: Line 31:
 
sporulated.  </p>
 
sporulated.  </p>
 
 
<p>The location in the genomic DNA makes it harder to retrieve the
+
data, since whole genome sequencing is required. The message is
+
protected by a digital lock: the key, and thus doesn’t need further
+
biological protection. </p>
+
 
+
<p>The key is not encrypted and has to be protected by a biological
+
lock. We followed different approaches to design a multi-layered
+
biological lock.</p>
+
 
</div>
 
</div>
 
<div class="right flone">
 
<div class="right flone">
Line 39: Line 38:
 
</div>
 
</div>
  
<p>We followed two main ideas, namely hiding the key and deleting
+
the key when unauthorized parties handle it.</p>
+
  
 
<p><ul><li><a href="/Team:Groningen/Proof">Read more about the integration and our proof of concept.</a></ul></li></p>
 
<p><ul><li><a href="/Team:Groningen/Proof">Read more about the integration and our proof of concept.</a></ul></li></p>

Revision as of 15:18, 18 October 2016

CryptoGE®M
Team
Project
Biology
Computing
Human Practice
Acknowledgements

Experiments

The biological realization of CryptoGErM consisted of four subprojects: integration, characterization, key hiding and key deletion.The location in the genomic DNA makes it harder to retrieve the data, since whole genome sequencing is required. The message is protected by a digital lock: the key, and thus doesn’t need further biological protection. The key is not encrypted and has to be protected by a biological lock. We followed different approaches to design a multi-layered biological lock. We followed two main ideas, namely hiding the key and deleting the key when unauthorized parties handle it.

Integration

The first subproject is the integration, the key and message sequences were integrated into the genomic DNA of two separate Bacillus subtilis strains. In order to achieve this we had the key and the message sequence synthesized by IDT. Then we cloned it in pSB1C3 to amplify it from there and cloned it in the B. subtilis integration biobrick BBa_K823023. This vector can be used to integrate sequences into the amyE locus of Bacillus subtilis. From there we integrated it in the genome of B. subtilis 168 trp+. For message and key transmission these B. subtilis strains were sporulated.

Characterization

The integration vector from team LMU Munich BacillusBiobrickbox 2012 (BBa_K823023) can be used to integrate an insert into the amyE locus of B. subtilis. In order to be able to efficiently use this integration vector we characterized BBa_K823023 by determining its transformation efficiency. This helped us in our project and will hopefully help future iGEM teams aswell.

Key hiding

MIC and MBC values of ciprofloxacin

We determined the MIC and MBC of ciprofloxacin on wild-type Bacillus subtilis 168 as well as the MIC of E. coli Top 10 and B. subtilis 168 carrying the qnrS1 ciprofloxacin resistance gene. We could observe a significant improvement in antibiotic tolerance when compared to the MIC values of the wild-type strains Additionally we obtained a B. subtilis 168 isolate by directed evolution which is even more resistant to ciprofloxacin.

Decoy

Hiding the key became called the decoy approach.The key-containing spore will be send in a mixture of different decoy spores. The recipient has to be aware of the special treatment that is required to select the correct spores from the decoy. We have been working on a photoswitchable ciprofloxacin compound.

Only the knowledge about the right wavelength allows the recipient to activate the added ciprofloxacin and thus start selection of the right spore strain.

Our design of the decoy approach included the biobricks for ciprofloxacin resistance, a superfolder GFP and a pATP promotor.

Key deletion

NucA key deletion

Another biological security layer is provided by our key deletion system. We have been working on two different approaches. The first is a nucA killswitch which is made out of an assembly of different biobricks. Atc or tetracycline have to be added to inhibit the tetR promoter to stop the expression of the nucA and digestion of the key sequence.

CRISPR/Cas9 key deletion

The second approach makes use of a CRISPR/Cas9 system which will delete the key from the genome if no special treatment is applied. Addition of Atc or tetracycline will stop the cas9 expression.

This system is highly flexible and biological layers can easily be added or modified to the wishes of the user.

Oop top