Difference between revisions of "Team:Groningen/Design"

 
(43 intermediate revisions by 5 users not shown)
Line 36: Line 36:
 
 
 
<p>We designed a novel and safe data storage and transmission  
 
<p>We designed a novel and safe data storage and transmission  
system by combining digital and biological safety. The system  
+
system by combining digital and biological safety precautions. The system  
 
consists of the data which is to be transmitted or preserved,  
 
consists of the data which is to be transmitted or preserved,  
 
further called: the message, and a key to the message. The key  
 
further called: the message, and a key to the message. The key  
Line 42: Line 42:
 
is encrypted and thereby protected by the digital key, the key  
 
is encrypted and thereby protected by the digital key, the key  
 
itself also needs protection. Therefore we developed a system of  
 
itself also needs protection. Therefore we developed a system of  
different biological safety layers. Our system CryptoGErM is an  
+
different biological safety layers. Our CryptoGErM system is an  
 
unhackable bioencryption system. Even if cyber criminals would  
 
unhackable bioencryption system. Even if cyber criminals would  
 
intercept the system, they would not be able to get their hands on  
 
intercept the system, they would not be able to get their hands on  
Line 50: Line 50:
 
biological procedure that has to be applied in order to access the  
 
biological procedure that has to be applied in order to access the  
 
key.</p>
 
key.</p>
</section>
+
 
 +
<video controls preload="metadata">
 +
<source src="https://static.igem.org/mediawiki/2016/d/dc/T--Groningen--Design-spygem.mp4" />
 +
</video>
 +
 +
<figcaption>Watch this animation to learn about the CryptoGErM system!</figcaption>
 +
 
 +
</section>
 
<section>
 
<section>
 
<h3 class="apps">Applications:</h3>
 
<h3 class="apps">Applications:</h3>
Line 76: Line 83:
 
<h3 class="crypt">Encryption and Conversion</h3>
 
<h3 class="crypt">Encryption and Conversion</h3>
 
 
<p>The message that is to be send and stored is being encrypted  
+
<p>The message that is to be sent and stored is encrypted  
using the Rijndael algorithm which is an encryption algorithm. This  
+
using the Rijndael algorithm. This  
means encoding the message so only an authorized person can read  
+
means the message is encoded so only an authorized person can read  
 
it. The plain text is being converted to cipher text. In this state  
 
it. The plain text is being converted to cipher text. In this state  
 
the message cannot be read. The algorithm requires a key for the  
 
the message cannot be read. The algorithm requires a key for the  
Line 97: Line 104:
 
adds header and footer sequences to the message and key sequences  
 
adds header and footer sequences to the message and key sequences  
 
for the recipient to be able to recover key and message from the  
 
for the recipient to be able to recover key and message from the  
full genome.</p>
+
full genome. Figure 1 shows a conversion table of text to the ASCII code, to binary and to DNA.</p>
 
 
 
<p>The work with BioBricks requires some reserved sequences like  
 
<p>The work with BioBricks requires some reserved sequences like  
Line 174: Line 181:
 
</div>
 
</div>
 
 
<figcaption>Conversion from text to DNA</figcaption>
+
<figcaption>Figure 1. Conversion from text to DNA</figcaption>
 
</figure>
 
</figure>
+
<ul class="linkylist">
<p><a href="/Team:Groningen/Software">Learn more about our software</a></p>
+
<li><a href="/Team:Groningen/Software">Learn more about our software</a></li>
 +
                        </ul>
 
</section>
 
</section>
 
<section>
 
<section>
Line 184: Line 192:
 
<p>Our original message and our key have been converted into DNA  
 
<p>Our original message and our key have been converted into DNA  
 
sequences. Synthesizing DNA is possible at constantly decreasing  
 
sequences. Synthesizing DNA is possible at constantly decreasing  
costs (reference). Data in DNA format has many advantages. The  
+
costs <sup id="ref-1"><a href="#cite-1">[1]</a></sup>.</p>
 +
 +
<p>Data in DNA format has many advantages. The  
 
right choice of organism can deliver even more advantages. We  
 
right choice of organism can deliver even more advantages. We  
choose <em>Bacillus subtilis.</em> It is not pathogenic for humans, it is  
+
chose <em>Bacillus subtilis.</em> It is not pathogenic for humans, it is  
 
naturally competent and a well-researched model-organism. On top of  
 
naturally competent and a well-researched model-organism. On top of  
 
all that it can form highly resistant endospores. Viable spores of  
 
all that it can form highly resistant endospores. Viable spores of  
<em>B. subtilis</em> could be recovered from a several million year old salt  
+
<em>B. subtilis</em> could be recovered from a 250 million year old salt  
crystal (reference). What else could we wish for as a highly safe  
+
crystal <sup id="ref-2"><a href="#cite-2">[2]</a></sup>. What else could we wish for as a highly safe  
 
storage and transmission system? The sequences of key and message  
 
storage and transmission system? The sequences of key and message  
 
are being integrated into the genome of two different <em>B. subtilis</em>  
 
are being integrated into the genome of two different <em>B. subtilis</em>  
 
strains by making use of the <a href="http://parts.igem.org/Part:BBa_K823023">BBa_K823023</a> <em>B. subtilis</em> integration  
 
strains by making use of the <a href="http://parts.igem.org/Part:BBa_K823023">BBa_K823023</a> <em>B. subtilis</em> integration  
vector which integrates into the amyE locus. Like this they can be  
+
vector which integrates into the amyE locus. A scheme of the integration process is shown in Figure 3 and the sequences integrated in the plasmid is visible in figure 3. Like this they can be  
 
shipped or stored separately what makes interception of our system  
 
shipped or stored separately what makes interception of our system  
 
for unauthorized parties even harder.  Genomic integration of both  
 
for unauthorized parties even harder.  Genomic integration of both  
 
message and key is safer than plasmid integration because the  
 
message and key is safer than plasmid integration because the  
 
relevant sequences are hidden in a full genome. Whole genome  
 
relevant sequences are hidden in a full genome. Whole genome  
sequencing is more elaborated than sequencing of plasmid.
+
sequencing is more elaborated than sequencing of plasmid,
Especially if unauthorized parties don’t know what they are looking  
+
especially if unauthorized parties don’t know what they are looking  
 
for.</p>
 
for.</p>
 
 
<figure class="split">
+
<figure>
<div class="left flone"><img src="https://static.igem.org/mediawiki/2016/5/5f/T--Groningen---Design---message_in_cell-.png" /></div>
+
<img src="https://static.igem.org/mediawiki/2016/a/aa/T--Groningen--Workflow2-wit.png" />
<div class="right flone"><img src="https://static.igem.org/mediawiki/2016/e/ef/T--Groningen---Design---messageBB-.png" /></div>
+
 
</figure>
 
</figure>
 +
 +
<figcaption>Figure 2. Workflow of the integration of message and key into the genomic DNA of <em>Bacillus subtilis</em>.</figcaption>
 +
 +
<div class="split">
 +
<figure class="cycler left flone">
 +
<img class="active base dark" src="https://static.igem.org/mediawiki/2016/5/5f/T--Groningen---Design---message_in_cell-.png" />
 +
<img class="dark" src="https://static.igem.org/mediawiki/2016/e/ef/T--Groningen---Design---messageBB-.png" />
 +
</figure>
 +
 +
<figure class="cycler right flone">
 +
<img class="active base dark" src="https://static.igem.org/mediawiki/2016/b/b4/T--Groningen---Design---keybacillusnew-.png" />
 +
<img class="dark" src="https://static.igem.org/mediawiki/2016/2/25/T--Groningen---Design---KeyBB-.png" />
 +
</figure>
 +
 +
</div>
 +
<p></p>
 +
<figcaption>Figure 3. Sequences of message (<a href="http://parts.igem.org/Part:BBa_K1930001">BBa_K1930001</a>) and key (<a href="http://parts.igem.org/Part:BBa_K1930000">BBa_K1930000</a>) integrated into the <em>amyE</em> locus of the genomic DNA of <em>B. subtilis</em>.</figcaption>
 +
 
 
<figure class="split">
 
<div class="left flone"><img src="https://static.igem.org/mediawiki/2016/b/b4/T--Groningen---Design---keybacillusnew-.png" /></div>
 
<div class="right flone"><img src="https://static.igem.org/mediawiki/2016/2/25/T--Groningen---Design---KeyBB-.png" /></div>
 
</figure>
 
  
 
<ul class="linkylist">
 
<ul class="linkylist">
Line 217: Line 240:
 
advantages of using DNA and bacteria for data storage</a></li>
 
advantages of using DNA and bacteria for data storage</a></li>
 
 
<li><a href="/Team:Groningen/Experiments">Learn more about the  
+
<li><a href="/Team:Groningen/Proof">Learn more about the  
integration of the message sequence into the <em>B. subtilis</em>  
+
integration of the sequences in to the <em>B. subtilis</em>  
 
genome</a></li>
 
genome</a></li>
 
 
<li><a href="/Team:Groningen/Experiments">Learn more about the
+
<li><a href="/Team:Groningen/PlasmidConstruction">Learn more  
integration of the key sequence into the <em>B. subtilis</em>
+
about the plasmid construction</a></li>
genome</a></li>
+
 
</ul>
 
</ul>
 
</section>
 
</section>
Line 231: Line 253:
 
<p>Spores are highly stable at room temperature and they don’t  
 
<p>Spores are highly stable at room temperature and they don’t  
 
require and nutrients. The can stay in a test tube for weeks. This  
 
require and nutrients. The can stay in a test tube for weeks. This  
grants enough time to send them to any spot on the Earth. And who  
+
grants enough time to send them to any spot on Earth. And who  
 
would suspect highly secret data in a tiny amount of colorless  
 
would suspect highly secret data in a tiny amount of colorless  
liquid in a reaction tube?</p>
+
liquid in a reaction tube? A scheme of sporulation and shipping can seen in Figure 4.</p>
 
 
 
<ul class="linkylist">
 
<ul class="linkylist">
Line 241: Line 263:
  
  
                      <figure>
+
            <figure>
<img src="https://static.igem.org/mediawiki/2016/f/fa/T--Groningen--Spores.png" />
+
<img src="https://static.igem.org/mediawiki/2016/d/d7/T--Groningen--Workflow3-wit2.png" />
 
</figure>
 
</figure>
 +
 +
 +
<figcaption>Figure 4: <em>Bacillus subtilis</em> forms highly resistant endospores which can easily be shipped.</figcaption>
  
  
Line 253: Line 278:
 
arrived at the recipient the key has to be recovered. Only with the  
 
arrived at the recipient the key has to be recovered. Only with the  
 
key it is possible to decode the message in the genome of the  
 
key it is possible to decode the message in the genome of the  
message-spores. </p>
+
message-spores. As visible in Figure 5, the spores have to recieve the right treatment during germination, otherwise the key sequence cannot be recovered.</p>
 +
 +
<!-- <p><img src="https://static.igem.org/mediawiki/2016/0/05/T--Groningen--Bacilluspinkwithstuff2.png" /></p> -->
 
 
<p><img src="https://static.igem.org/mediawiki/2016/0/05/T--Groningen--Bacilluspinkwithstuff2.png" /></p>
+
<div class="split">
 +
<figure class="left flone">
 +
<img src="https://static.igem.org/mediawiki/2016/8/8e/T--Groningen--tour-medium2.png" />
 +
 +
<figcaption>Figure 5: Medium with spores</figcaption>
 +
</figure>
 +
<figure class="left flone">
 +
<img src="https://static.igem.org/mediawiki/2016/0/03/T--Groningen--tour-mediumdead.png" />
 +
 +
<figcaption>Wrong treatment: spores died &amp; key lost <strong>forever</strong></figcaption>
 +
</figure>
 +
<figure class="right flone">
 +
<img src="https://static.igem.org/mediawiki/2016/6/6e/T--Groningen--tour-mediumalive.png" />
 +
 +
<figcaption>Right treatment: CryptoGErM lives</figcaption>
 +
</figure>
 +
</div>
 
 
 
<h4>1. Decoy key hiding</h4>
 
<h4>1. Decoy key hiding</h4>
Line 268: Line 311:
 
recovery. Even better: This resistance cassette also provides  
 
recovery. Even better: This resistance cassette also provides  
 
resistance against spirofloxacin which is a conjugate of the  
 
resistance against spirofloxacin which is a conjugate of the  
regular antibiotic ciprofloxacin and a spiropyrin photoswitch. In  
+
regular antibiotic ciprofloxacin and a spiropyran photoswitch. In  
case of using the photoswitchable antibiotic, spirofloxacin, in its  
+
case of using the photoswitchable antibiotic, spirofloxacin (in its  
inactivated state, could be already added to the spore mixture. The  
+
inactivated state) could be already added to the spore mixture. The  
recipient simply has to activate it by shining UV light of the  
+
recipient simply has to activate it by shining light of the  
 
right wavelength on it.</p>
 
right wavelength on it.</p>
 
 
<p>To design a qnrS1 resistance cassette BioBrick we designed a  
+
<p>To design a <em>qnrS1</em> resistance cassette BioBrick we designed a  
 
gBlock that contains the <em>Bacillus subtilis</em> promoter PatpI, which is  
 
gBlock that contains the <em>Bacillus subtilis</em> promoter PatpI, which is  
 
active from a very early stage of germination and includes a  
 
active from a very early stage of germination and includes a  
ribosome binding site. The gBlock also contains the original qnrS1  
+
ribosome binding site. The gBlock also contains the original <em>qnrS1 </em>
 
gene sequence from <em>E. coli</em>, the double terminator <a href="http://parts.igem.org/Part:BBa_B0015">BBa_B0015</a> from  
 
gene sequence from <em>E. coli</em>, the double terminator <a href="http://parts.igem.org/Part:BBa_B0015">BBa_B0015</a> from  
iGEM as well as the prefix and suffix for BioBricks. The qnrS1  
+
iGEM as well as the prefix and suffix for BioBricks. The <em>qnrS1</em>
 
resistance cassette was integrated into the amyE locus of the <em>B.  
 
resistance cassette was integrated into the amyE locus of the <em>B.  
 
subtilis</em> genome using the <a href="http://parts.igem.org/Part:BBa_K823023">BBa_K823023</a> <em>B. subtilis</em> integration  
 
subtilis</em> genome using the <a href="http://parts.igem.org/Part:BBa_K823023">BBa_K823023</a> <em>B. subtilis</em> integration  
vector.</p>
+
vector. The <em>qnrS1</em> plasmid and the selection process of the key-containing spores from the decoy can be seen in Figure 6.</p>
 
 
<figure>
+
<div class="centrate">
<img src="https://static.igem.org/mediawiki/2016/d/d9/T--Groningen---Design---qnrs1BB-.png" />
+
<figure class="cycler">
</figure>
+
<!--
 
+
<img class="dark" src="https://static.igem.org/mediawiki/2016/thumb/4/4c/T--Groningen---Design---decoy-.png/694px-T--Groningen---Design---decoy-.png" />
<figure>
+
<img class="dark base" src="https://static.igem.org/mediawiki/2016/thumb/c/cd/T--Groningen--Add_cipro_then_spores_die_copia2.png/694px-T--Groningen--Add_cipro_then_spores_die_copia2.png" />-->
<img src="https://static.igem.org/mediawiki/2016/4/4c/T--Groningen---Design---decoy-.png" />
+
<img class="dark active" src="https://static.igem.org/mediawiki/2016/d/d9/T--Groningen---Design---qnrs1BB-.png" />
</figure>
+
<img class="dark" src="https://static.igem.org/mediawiki/2016/4/4c/T--Groningen---Design---decoy-.png" />
 
+
<img class="dark base" src="https://static.igem.org/mediawiki/2016/c/cd/T--Groningen--Add_cipro_then_spores_die_copia2.png" />
<figure>
+
</figure><p></p>
<img src="https://static.igem.org/mediawiki/2016/c/cd/T--Groningen--Add_cipro_then_spores_die_copia2.png" />
+
<figcaption>Figure 6. The <em>qnrS1</em> resistance cassette (<a href="http://parts.igem.org/Part:BBa_K1930007">BBa_K1930007</a>) is integrated into the <em>amyE</em> locus of the <em>B. subtilis</em> genome. Addition of the antibiotic ciprofloxacin will enable selection of the key-containing spores from the decoy.</figcaption>
</figure>
+
</div>
 
+
  
 
<p>For testing the efficiency of the selection of the correct key  
 
<p>For testing the efficiency of the selection of the correct key  
 
spores from the decoy a superfolder GFP was integrated into the  
 
spores from the decoy a superfolder GFP was integrated into the  
genome of the key spores. Via microscopy and flow cytometry the  
+
genome of the key spores. This can be seen in figure 7. Via microscopy and flow cytometry the  
 
selection efficiency could be observed. The superfolder GFP was  
 
selection efficiency could be observed. The superfolder GFP was  
 
integrated into the <em>B. subtilis</em> genome by using the pDR111 <em>B.  
 
integrated into the <em>B. subtilis</em> genome by using the pDR111 <em>B.  
 
subtilis</em> shuttle vector.</p>
 
subtilis</em> shuttle vector.</p>
 
 
<figure>
+
<figure class="cycler">
<img src="https://static.igem.org/mediawiki/2016/c/ca/T--Groningen--Labjournal-sfGFP-message-in-pDR111-plasmid-1.png" />
+
<img class="active dark" src="https://static.igem.org/mediawiki/2016/0/05/T--Groningen--Bacilluspinkwithstuff2.png" />
</figure>
+
<img class="base dark" src="https://static.igem.org/mediawiki/2016/c/c2/T--Groningen--Bacilluspink_glow2.png" />
+
<img class="dark" src="https://static.igem.org/mediawiki/2016/c/ca/T--Groningen--Labjournal-sfGFP-message-in-pDR111-plasmid-1.png" />
 
+
</figure><p></p>
<figure>
+
<figcaption>Figure 7: Integration of a <em>sfGFP</em> (<a href="http://parts.igem.org/Part:BBa_K1930006">BBa_K1930006</a>) into the genomic DNA of <em>B. subtilis</em>.</figcaption>
<img src="https://static.igem.org/mediawiki/2016/c/c2/T--Groningen--Bacilluspink_glow2.png" />
+
</figure>
+
  
 
<h4>2. NucA key deletion</h4>
 
<h4>2. NucA key deletion</h4>
Line 331: Line 371:
 
tries to grow the key-containing spores in regular growth medium  
 
tries to grow the key-containing spores in regular growth medium  
 
without the addition of tetracycline, the key deletion will be  
 
without the addition of tetracycline, the key deletion will be  
active and the DNA will be digested by the nuclease.</p>
+
active and the DNA will be digested by the nuclease. This process can be seen in figure 8.</p>
 
 
<figure>
+
<figure class="cycler">
<img src="https://static.igem.org/mediawiki/2016/b/bf/T--Groningen--Labjournal-nucA-in-pSB1C3-plasmid.png" />
+
<img class="active dark" src="https://static.igem.org/mediawiki/2016/0/05/T--Groningen--Bacilluspinkwithstuff2.png" />
</figure>
+
<img class="dark" src="https://static.igem.org/mediawiki/2016/5/55/T--Groningen---Design---nucAcutting-.png" />
 
+
<img class="dark base" src="https://static.igem.org/mediawiki/2016/b/bf/T--Groningen--Labjournal-nucA-in-pSB1C3-plasmid.png" />
<figure>
+
<img src="https://static.igem.org/mediawiki/2016/5/55/T--Groningen---Design---nucAcutting-.png" />
+
 
</figure>
 
</figure>
  
 +
<figcaption>Figure 8. If the right repressor is not added a nuclease will cut the genome and thus delete the key sequence.</figcaption>
  
 
<h4>3. CRISPR key deletion</h4>
 
<h4>3. CRISPR key deletion</h4>
Line 358: Line 397:
 
containing the CRISPR/Cas9 system are being revived by unauthorized  
 
containing the CRISPR/Cas9 system are being revived by unauthorized  
 
parties who are unaware of the correct treatment procedure, the  
 
parties who are unaware of the correct treatment procedure, the  
targeted area, in this case the key-sequence will be deleted. This  
+
targeted area, in this case the key-sequence will be deleted as visible in Figure 9. This  
 
way the message will be safe and secure.</p>
 
way the message will be safe and secure.</p>
  
<figure>
+
<figure class="split">
<img src="https://static.igem.org/mediawiki/2016/3/30/T--Groningen--Design-10.png" />
+
<div class="left fltwo"><img src="https://static.igem.org/mediawiki/2016/5/55/T--Groningen--crisprsomething.png" /></div>
 +
<div class="right flthree"><img src="https://static.igem.org/mediawiki/2016/5/55/T--Groningen---Design---crisprcutting-.png" /></div>
 
</figure>
 
</figure>
  
<figure>
+
<figcaption>Figure 9. Without the addition of the correct repressor the CRISPR/Cas9 system will delete the key sequence from the genome of <em>B. subtilis</em>.</figcaption>
<img src="https://static.igem.org/mediawiki/2016/5/55/T--Groningen---Design---crisprcutting-.png" />
+
 
</figure>
+
  
 
 
 
<ul class="linkylist">
 
<ul class="linkylist">
 
<li><a href="/Team:Groningen/Decoy">Learn more about the selection of the correct spores from the decoy.</a></li>
 
<li><a href="/Team:Groningen/Decoy">Learn more about the selection of the correct spores from the decoy.</a></li>
<li><a href="/Team:Groningen/">Learn more about the modelling of the DNA-ciprofloxacin-interaction.</a></li>
+
<li><a href="/Team:Groningen/SpiroModel">Learn more about the modelling of the DNA-spirofloxacin-interaction.</a></li>
 
<li><a href="/Team:Groningen/PhotoswitchableAntibiotics">Learn more about the photoswitchable antibiotic.</a></li>
 
<li><a href="/Team:Groningen/PhotoswitchableAntibiotics">Learn more about the photoswitchable antibiotic.</a></li>
 
<li><a href="/Team:Groningen/KeyDeletion">Learn more about the key deletion</a></li>
 
<li><a href="/Team:Groningen/KeyDeletion">Learn more about the key deletion</a></li>
Line 421: Line 460:
 
</ul>
 
</ul>
 
</section>
 
</section>
 +
<section>
 +
<h2>References</h2>
 +
<ul>
 +
<li id="cite-1"><a href="#ref-1">[1]</a> <a href="https://www.genome.gov/sequencingcosts/">NIH National Human Genome Research Institute.</a> [Online. Accessed October 19, 2016].</li>
 +
<li id="cite-2"><a href="#ref-2">[2]</a> Vreeland, R.H., Rosenzweig, W.D. & Powers, D.W., 2000. <a href="http://www.ncbi.nlm.nih.gov/pubmed/11057666">Isolation of a 250 million-year-old halotolerant bacterium from a primary salt crystal</a>. Nature, 407(6806), pp.897–900. [Online. Accessed September 26, 2016].</li>
 +
</ul>
 +
</section>
 +
 +
 
</article>
 
</article>
 
</html>
 
</html>
 
{{Groningen/footer}}
 
{{Groningen/footer}}

Latest revision as of 21:06, 19 October 2016

CryptoGE®M
Team
Project
Biology
Computing
Human Practice
Acknowledgements

Design

We designed a novel and safe data storage and transmission system by combining digital and biological safety precautions. The system consists of the data which is to be transmitted or preserved, further called: the message, and a key to the message. The key functions as a password to retrieve the message. Whilst the message is encrypted and thereby protected by the digital key, the key itself also needs protection. Therefore we developed a system of different biological safety layers. Our CryptoGErM system is an unhackable bioencryption system. Even if cyber criminals would intercept the system, they would not be able to get their hands on the message because they lack the key. To access the key not only general knowledge about molecular biology is required. The recipient has to know specific information about the exact biological procedure that has to be applied in order to access the key.

Watch this animation to learn about the CryptoGErM system!

Applications:

CryptoGErM has three main possibilities of application. Short messages can be encrypted in the genome of Bacillus subtilis as described in this chapter. The genome of B. subtilis consists of approximately 4 million base pairs. Two bits are converted into one base pair. Thus, 1 MB could be stored in the genome of one bacterium.

For sending of larger datasets it would be possible to send the encrypted data via conventional methods like email and only send the key in spores.

Furthermore it is an option to divide the dataset over the genome of several bacteria. This would also provide a way of long term storage of large datasets.

Encryption and Conversion

The message that is to be sent and stored is encrypted using the Rijndael algorithm. This means the message is encoded so only an authorized person can read it. The plain text is being converted to cipher text. In this state the message cannot be read. The algorithm requires a key for the encryption process. This key can be a word just like a password. In theory it is possible to decrypt the message without the key but a lot of computing power, knowledge and resources are required so practical it is almost impossible. With the key the message can be easily decrypted. The key itself is, of course, not encrypted.

At this point of our design we have a key and message. The message is encrypted and reads out as nonsense. At first key and message consist out of plain text, numbers and symbols. Our encryption and decryption machine then converts those into the corresponding ASCII code. The number sequence of the ASCII code is then converted into binary. And the binary code is converted into a sequence of base pairs. Thus 00 stands for adenine, 01 for cytosine, 10 for thymidine, and 11 for guanine. The machine also adds header and footer sequences to the message and key sequences for the recipient to be able to recover key and message from the full genome. Figure 1 shows a conversion table of text to the ASCII code, to binary and to DNA.

The work with BioBricks requires some reserved sequences like the restriction enzyme sequences for EcoRI, PstI, SpeI, XbaI and ideally also NotI. Additionally our work with the B. subtilis shuttle vector pDR111 required the reserved sequences SalI, HindIII and BglII. Our encryption and decryption machine can consider those reserved sequences while converting message and key. It is also individually adjustable to other required reservations.

Letter H e l l o w o r l d
ASCII 072 101 108 108 111 032 119 111 114 108 100
Binary
0100
1000
0110
0101
0110
1100
0110
1100
0110
1111
0010
0000
0111
0111
0110
1111
0111
0010
0110
1100
0110
0100
DNA ATAC CCTC AGTC AGTC GGTC AATA GCGC GGTC TAGC AGTC ACTC
Figure 1. Conversion from text to DNA

Integration:

Our original message and our key have been converted into DNA sequences. Synthesizing DNA is possible at constantly decreasing costs [1].

Data in DNA format has many advantages. The right choice of organism can deliver even more advantages. We chose Bacillus subtilis. It is not pathogenic for humans, it is naturally competent and a well-researched model-organism. On top of all that it can form highly resistant endospores. Viable spores of B. subtilis could be recovered from a 250 million year old salt crystal [2]. What else could we wish for as a highly safe storage and transmission system? The sequences of key and message are being integrated into the genome of two different B. subtilis strains by making use of the BBa_K823023 B. subtilis integration vector which integrates into the amyE locus. A scheme of the integration process is shown in Figure 3 and the sequences integrated in the plasmid is visible in figure 3. Like this they can be shipped or stored separately what makes interception of our system for unauthorized parties even harder. Genomic integration of both message and key is safer than plasmid integration because the relevant sequences are hidden in a full genome. Whole genome sequencing is more elaborated than sequencing of plasmid, especially if unauthorized parties don’t know what they are looking for.

Figure 2. Workflow of the integration of message and key into the genomic DNA of Bacillus subtilis.

Figure 3. Sequences of message (BBa_K1930001) and key (BBa_K1930000) integrated into the amyE locus of the genomic DNA of B. subtilis.

Transmission

Spores are highly stable at room temperature and they don’t require and nutrients. The can stay in a test tube for weeks. This grants enough time to send them to any spot on Earth. And who would suspect highly secret data in a tiny amount of colorless liquid in a reaction tube? A scheme of sporulation and shipping can seen in Figure 4.

Figure 4: Bacillus subtilis forms highly resistant endospores which can easily be shipped.

Treatment

After the different spores, containing key and message, have arrived at the recipient the key has to be recovered. Only with the key it is possible to decode the message in the genome of the message-spores. As visible in Figure 5, the spores have to recieve the right treatment during germination, otherwise the key sequence cannot be recovered.

Figure 5: Medium with spores
Wrong treatment: spores died & key lost forever
Right treatment: CryptoGErM lives

1. Decoy key hiding

To make it especially hard for unauthorized parties to access our key, the key-spores will be sent in a mixture of decoy spores. The decoy is present in a much higher ratio than the key-spores. The key-spores have to be recovered using a specific selection mechanism. We have developed a ciprofloxacin resistance cassette that can be integrated into the B. subtilis genome. Only the knowledge of this specific selection antibiotic will allow the recovery. Even better: This resistance cassette also provides resistance against spirofloxacin which is a conjugate of the regular antibiotic ciprofloxacin and a spiropyran photoswitch. In case of using the photoswitchable antibiotic, spirofloxacin (in its inactivated state) could be already added to the spore mixture. The recipient simply has to activate it by shining light of the right wavelength on it.

To design a qnrS1 resistance cassette BioBrick we designed a gBlock that contains the Bacillus subtilis promoter PatpI, which is active from a very early stage of germination and includes a ribosome binding site. The gBlock also contains the original qnrS1 gene sequence from E. coli, the double terminator BBa_B0015 from iGEM as well as the prefix and suffix for BioBricks. The qnrS1 resistance cassette was integrated into the amyE locus of the B. subtilis genome using the BBa_K823023 B. subtilis integration vector. The qnrS1 plasmid and the selection process of the key-containing spores from the decoy can be seen in Figure 6.

Figure 6. The qnrS1 resistance cassette (BBa_K1930007) is integrated into the amyE locus of the B. subtilis genome. Addition of the antibiotic ciprofloxacin will enable selection of the key-containing spores from the decoy.

For testing the efficiency of the selection of the correct key spores from the decoy a superfolder GFP was integrated into the genome of the key spores. This can be seen in figure 7. Via microscopy and flow cytometry the selection efficiency could be observed. The superfolder GFP was integrated into the B. subtilis genome by using the pDR111 B. subtilis shuttle vector.

Figure 7: Integration of a sfGFP (BBa_K1930006) into the genomic DNA of B. subtilis.

2. NucA key deletion

Even more safety is provided by two key deletion approaches. In this case, if the recipient doesn’t apply the correct treatment, the key sequence will be destroyed.

For the design of a nucA key deletion we made use of the following BioBricks: BBa_R0040_tetR, BBa_K729004_nuclease, BBa_B0030_RBS and BBa_B0015_terminator. During the cloning process we expected to obtain the following BioBricks: RBS-nuclease, tetR-RBS-nuclease and tetR-RBS-nuclease-terminator. The key deletion is controlled by the constitutively on promoter PtetR. RNA polymerase binds to the DNA sequence and leads to the expression of the nuclease. If tetracycline is added, it functions as a repressor, binds to the promoter and thus leads to the inhibition of the transcription of the nuclease. If an unauthorized party tries to grow the key-containing spores in regular growth medium without the addition of tetracycline, the key deletion will be active and the DNA will be digested by the nuclease. This process can be seen in figure 8.

Figure 8. If the right repressor is not added a nuclease will cut the genome and thus delete the key sequence.

3. CRISPR key deletion

Another key deletion approach makes use of the CRISPR/Cas9 system. The system can be used as a genome editing tool. The plasmid pJOE8999 is a shuttle vector with a pUC origin of replication for E. coli, a kanamycin resistance gene and a temperature-sensitive replication origin of plasmid pE194ts. This plasmid carries the Cas9 gene under the transcriptional regulation of a mannose-inducible promoter PmanP, and a single guide RNA under a strong constitutive promoter. For application in our project, the idea was to replace the mannose-inducible promoter with a tetracycline-repressible promoter PtetR. The pTetR promoter is constitutively on and is repressed by TetR. The repression can be inhibited by the addition of tetracycline. If the key-spores containing the CRISPR/Cas9 system are being revived by unauthorized parties who are unaware of the correct treatment procedure, the targeted area, in this case the key-sequence will be deleted as visible in Figure 9. This way the message will be safe and secure.

Figure 9. Without the addition of the correct repressor the CRISPR/Cas9 system will delete the key sequence from the genome of B. subtilis.

Decoding

Now that the receiver has received the message and was able to successfully retrieve the correct key-spores, he can sequence both of them. Key and message sequence have to be put into the encryption and decryption machine. The machine is able to detect the correct part of the full sequence by a header (GACCAAGCCTGC) and a footer (GCACCCACCGAC) that have been added to the sequence will converting it into a DNA string. The machine will apply the key to the message and convert it back from DNA into the data set that was chosen by the sender.

What if?

Making use of artificial intelligence and computational modelling we have designed different scenarios taking into account a possible intruder of our system and also about how the mutation rate of DNA influences our system.

We have also looked at the future perspectives of our project. With the great flexibility of the BioBrick system, other methods for securing the data inside DNA can be added or developed. Finally, we have thought of ways to access the data in the DNA faster.

References

Oop top