SlideShare a Scribd company logo
1 of 40
Nucleotide Cryptology: Hidden
          Messages
• Encrypting with DNA Janet Page
• The Coding Dylan Goodrich
• The Chemistry Spenser Davis
• Biological Computing John Madrigal
• From Hidden Messages to Memories
  HyakBarseghyan
• Amplified Natural Intelligence Miriam
  Barseghyan
• The Ethics Kelsey Knox
Concept
We were inspired by Alan Turing’s coding and
 decoding work he did for the military. We have
 developed an idea to create a code out of human
 DNA, insert that DNA into a cell and then insert
 the cell into a individual, creating a secure way to
 transfer information. The message is doubly
 protected by its encryption and then by its ability
 to be indistinguishable from the individual’s
 normal cells. We are using Nucleotide Cryptology
 to send hidden messages.
Encrypting with DNA

            By: Janet Page
   In the spirit of Alan Turing, we would like to offer a
    new method in which to encode messages.
   Unlike other codes, our code will be biological, and
    will be encrypted in DNA itself.
    Our method involves encoding a message using
    some sort of encryption with nucleotide sequences
    and implanting this sequence into the body of the
    messenger.
   The receiving end will know where to look for this
    particular message.
How can we convert English into
        nucleotide sequences?
   Easiest method is a simple cipher: each
    English letter corresponds to a sequence of
    four nucleotides


   Instead, we would like to use a cipher loosely
    based on a Vigenère Cipher, which would use
    4 different conversions which switch off with
    every letter.
Sample Cipher




                Encryption
The Coding

By: Dylan Goodrich
Layers of Protection
Code Existence
– Awareness of the code is likely to take a while due
  to the novelty of the idea
Identifying “carriers”
– Will be difficult to determine who has the code on
  their person. Could pretend to give people code
  so they do not know whether or not they have it.
  Reduces likelihood of betrayal or accidents
Layers of Protection
Location on the body
– Will be difficult to isolate location of the injected
  cell colony. Could pretend to inject a carrier
  multiple times to prevent them from giving away
  relative location.
Primer sequence
– As discussed before the primer sequence is
  needed to isolate the area of DNA that contains
  the message. Can be made highly variable and
  complex
Human Protection
Tumor Prevention
– Potential DNA code sequences will need to be
  tested to make sure that it does not induce
  uncontrolled proliferation within the carrier, thus
  putting him at risk.
– DNA still needs to be able to allow for moderate
  cell replication to ensure safety of the cells
  containing the code
Human Protection
“Self Destruct”
– Carrier cells will need to be highly sensitive to
  biological changes. If a person carrying a code
  dies then the cells with the code must be
  destroyed to prevent a prolonged search for them
– If the enemy knows this then this will prevent
  them from killing carriers. Abuse or
  malnourishment may also stress the cells into
  dying, preventing these tactics against the carriers
  as well.
The Chemistry

By: Spenser Davis
The Chemistry Behind
          Nucleotide Cryptology
• Before the injection of code, the data must be
  implemented into the genetic code of the
  messenger/storage person. DNA is extracted
  through a blood sample and an appropriate
  locus is determined for code insertion. It is
  important to choose a locus that does not
  code for any vital proteins, etc. Once chosen,
  the code will be inserted via PCR based site-
  directed mutagenesis (picture shown below).
The Chemistry Behind
            Nucleotide Cryptology
• The basic procedure requires the synthesis of a short
  DNA primer. This synthetic primer contains the desired
  mutation and is complementary to the template DNA
  around the mutation site so it can hybridize with the
  DNA in the gene of interest. The mutation may be a
  single base change (a point mutation), multiple base
  changes, deletion or insertion. The single-stranded
  primer is then extended using a DNA Polymerase,
  which copies the rest of the gene. The gene thus
  copied contains the mutated site, and is then
  introduced into a host cell as a vector and cloned.
  Finally, mutants are selected.
The Chemistry Behind
               Nucleotide Cryptology
• The original method using single-primer extension is inefficient due
  to a lower yield of mutants. The resulting mixture may contain both
  the original unmutated template as well as the mutant strand,
  producing a mix population of mutant and non-mutant progenies.
  The mutants may also be counter-selected due to presence of
  mismatch repair system which favors the methylated template
  DNA. Many approaches have since been developed to improve the
  efficiency of mutagenesis. The mutagenesis therefore would involve
  two sets of mutated primers flanking the desired region. And the
  selection method we could employ would be to include a simple
  antibiotic resistance gene in our mutation, then screen and select
  for mutants by plating on antibiotic+ plates and selecting surviving
  plaques. The DNA selected from the plaques would then be
  injected into the code carrier person.
The Chemistry Behind
               Nucleotide Cryptology
• The code decrypter would need to know the relative location of the
  cells in the body for extraction. Death will causes cell mitosis to fail
  and will thus ensure safe code delivery. Upon extraction of the
  code, the decrypter also needs to know either the primer sequence
  or the locus of interest to amplify via PCR then discover the
  sequence using gene probing microarrays. The way this works is as
  follows: pretend my code is AGTCGTC. This will only adhere to its
  complement TCAGCAG (let's ignore sticky ends and partial
  adherence for now). Microarray wells will contain randomized gene
  sequences such as: AGCTAGCA, AGTCTCGA, GCTAGCT, etc. However,
  only the true complement will bind to the coded sequence. It is in
  this way that the decrypter can uncover the true code. With a
  decryption key (cipher) already predetermined, the decrypter can
  decipher the message.
Biological Computing

    By John Madrigal
Moore’s Law
      • Technological trend
        where the amount of
        transistors doubles
        every 18 months
      • Experts believe that we
        are nearing a plateau
        and eventual block of
        continuing this trend
DNA Computing
• the use of DNA instead of
  silicon chips to solve
  complex mathematical
  problems
• Research has been done
  to find a way to move
  past current computer
  technology for the future
   – Bacteria computer solves
     Hamiltonian Path Problem
From Hidden Messages to
Memories: Alternative uses for
   Nucleotide Cryptology

       By: HyakBarseghyan
Memories Stored In DNA
The human brain has the ability to store and
transmit memories using images. There is a
specialized area in the brain called the
Hippocampus that is involved in the storage and
generation of memories. The way memories are
stored is still not quite understood. However, it is
speculated that visual or any other stimuli that a
person perceives is accompanied by the production
of proteins in the brain that are involved in
generation of new neuronal connections.
It is possible to design a gene by genetic
engineering and insert it into human cells using
ballistics. A special air pressurized gun will shoot
millions of copies of the desired gene into cells.
Some of the engineered sequence will incorporate
into the cell's genome. The inserted recombinant
DNA in the cells will be transcribed and translated
into a protein which will later be carried out from
the cell into the bloodstream and taken into the
brain, and will become involved in memory
generation and retrieval.
Depending on the design of the gene and its
product the person will see different images
appear in his/her imagination, starting from
known pieces of art to any other custom
generated memories. This technology will be
crucial in using human genetic programming in
information storage. Retrieval of the information
can be performed using any human subject
since the mechanism is the same from person to
person.
Amplified Natural Intelligence: More
 Applications for Biological Coding

        By: Miriam Barseghyan
• In our modern society technological advances
  are not shocking anymore. It is expected for
  various electronics to be further developed in
  order to achieve better device capabilities.
  However, while on the path creating Artificial
  Intelligence, we tend to neglect our own
  intellectual development.
• Behavioral modifications, particularly
  education, do tend to improve the level of
  human intelligence. However, this process is
  slow and requires constant work. As the new
  generations of computers that come out with
  improved functionality, it would be possible to
  create human beings with improved analytical
  and logical power.
• In the core of the model of creation of humans with
  Amplified Natural Intelligence (ANI) lies the concept of
  decoding a given code (by Alan Turing) and those of
  physiology and molecular biology. To achieve the
  proposed goal Human Genetic Engineering (HGE) is
  necessary. Genes need to be modified at an embryonic
  level in order to produce functional cells postnatally.
  Retroviral transfecton would be the core technique
  utilized in procedure. Through this technique, extra
  genes coding for Nerve Growth Factors (NGF) and
  molecules guiding axonal patterning, such as molecules
  from the Ephrinfamily, as well as genetic information
  coding for molecules that increase neuronal synaptic
  connectivity will be inserted into the embryonic
  genome during the early stages of embryonic
  development.
• The inserted code will be decoded by the
  natural mechanisms of the organism to
  produce exogenous molecules. These
  molecules will further amplify the effects of
  the endogenous molecules involved in
  nervous system development. Thus,
  neurogenesis along with axonal and synaptic
  efficient patterning will contribute to creation
  of ANI.
The Ethics

By: Kelsey Knox
“Genethics”: the idea that problems for humanity and the world
posed by the new genetic technology are novel and consequently a new kind
of ethics is needed (1)

As our project deals with inserting modified
 DNA into a human cell, and then putting that
 cell back in a human, ethical issues
 surrounding gene technologies are a major
 consideration.

  1. http://bioinformatics.istge.it/bcd
     /ForAll/Ethics/welcome.html
  2. Photo via
     http://thetechnologicalcitizen.co
     m/?p=1022
Potential “genethical” issues
• “playing god”
• Unsure consequences
• Informed consent
• Ownership of genetic
  code
• Objectification/devaluat
  ion of the individual

More Related Content

What's hot

Whole Genome Sequencing Analysis
Whole Genome Sequencing AnalysisWhole Genome Sequencing Analysis
Whole Genome Sequencing AnalysisEfi Athieniti
 
next generation sequencing (recent collection2018)
next generation sequencing (recent collection2018) next generation sequencing (recent collection2018)
next generation sequencing (recent collection2018) Newborn Screening KW
 
Sage - serial analysis of gene expression
Sage - serial analysis of gene expressionSage - serial analysis of gene expression
Sage - serial analysis of gene expressionSwati Pawar
 
Knowing Your NGS Upstream: Alignment and Variants
Knowing Your NGS Upstream: Alignment and VariantsKnowing Your NGS Upstream: Alignment and Variants
Knowing Your NGS Upstream: Alignment and VariantsGolden Helix Inc
 
The Next, Next Generation of Sequencing - From Semiconductor to Single Molecule
The Next, Next Generation of Sequencing - From Semiconductor to Single MoleculeThe Next, Next Generation of Sequencing - From Semiconductor to Single Molecule
The Next, Next Generation of Sequencing - From Semiconductor to Single MoleculeJustin Johnson
 
Massively Parallel Signature Sequencing (MPSS)
Massively Parallel Signature Sequencing (MPSS) Massively Parallel Signature Sequencing (MPSS)
Massively Parallel Signature Sequencing (MPSS) Bharathiar university
 
Bioinformatics tools for NGS data analysis
Bioinformatics tools for NGS data analysisBioinformatics tools for NGS data analysis
Bioinformatics tools for NGS data analysisDespoina Kalfakakou
 
Next Generation Sequencing of DNA
Next Generation Sequencing of DNANext Generation Sequencing of DNA
Next Generation Sequencing of DNAmaryamshah13
 
A decade into Next Generation Sequencing on marine non-model organisms: curre...
A decade into Next Generation Sequencing on marine non-model organisms: curre...A decade into Next Generation Sequencing on marine non-model organisms: curre...
A decade into Next Generation Sequencing on marine non-model organisms: curre...Alexander Jueterbock
 
Ngs introduction
Ngs introductionNgs introduction
Ngs introductionAlagar Suresh
 
2011 jeroen vanhoudt_ngs
2011 jeroen vanhoudt_ngs2011 jeroen vanhoudt_ngs
2011 jeroen vanhoudt_ngsDin Apellidos
 
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...EMC
 
Next generation sequencing technologies for crop improvement
Next generation sequencing technologies for crop improvementNext generation sequencing technologies for crop improvement
Next generation sequencing technologies for crop improvementanjaligoud
 
20160219 - S. De Toffol - Dal Sanger al NGS nello studio delle mutazioni BRCA
20160219 - S. De Toffol -  Dal Sanger al NGS nello studio delle mutazioni BRCA �20160219 - S. De Toffol -  Dal Sanger al NGS nello studio delle mutazioni BRCA �
20160219 - S. De Toffol - Dal Sanger al NGS nello studio delle mutazioni BRCA Roberto Scarafia
 
Impact_of_gene_length_on_DEG
Impact_of_gene_length_on_DEGImpact_of_gene_length_on_DEG
Impact_of_gene_length_on_DEGLong Pei
 
Clinical Application of RNA Sequencing - Bladder Cancer
Clinical Application of RNA Sequencing - Bladder CancerClinical Application of RNA Sequencing - Bladder Cancer
Clinical Application of RNA Sequencing - Bladder CancerUSD Bioinformatics
 
New generation Sequencing
New generation Sequencing New generation Sequencing
New generation Sequencing Vijay Raj Yanamala
 
Assembly and finishing
Assembly and finishingAssembly and finishing
Assembly and finishingNikolay Vyahhi
 

What's hot (20)

Sage
SageSage
Sage
 
RNA-Seq
RNA-SeqRNA-Seq
RNA-Seq
 
Whole Genome Sequencing Analysis
Whole Genome Sequencing AnalysisWhole Genome Sequencing Analysis
Whole Genome Sequencing Analysis
 
next generation sequencing (recent collection2018)
next generation sequencing (recent collection2018) next generation sequencing (recent collection2018)
next generation sequencing (recent collection2018)
 
Sage - serial analysis of gene expression
Sage - serial analysis of gene expressionSage - serial analysis of gene expression
Sage - serial analysis of gene expression
 
Knowing Your NGS Upstream: Alignment and Variants
Knowing Your NGS Upstream: Alignment and VariantsKnowing Your NGS Upstream: Alignment and Variants
Knowing Your NGS Upstream: Alignment and Variants
 
The Next, Next Generation of Sequencing - From Semiconductor to Single Molecule
The Next, Next Generation of Sequencing - From Semiconductor to Single MoleculeThe Next, Next Generation of Sequencing - From Semiconductor to Single Molecule
The Next, Next Generation of Sequencing - From Semiconductor to Single Molecule
 
Massively Parallel Signature Sequencing (MPSS)
Massively Parallel Signature Sequencing (MPSS) Massively Parallel Signature Sequencing (MPSS)
Massively Parallel Signature Sequencing (MPSS)
 
Bioinformatics tools for NGS data analysis
Bioinformatics tools for NGS data analysisBioinformatics tools for NGS data analysis
Bioinformatics tools for NGS data analysis
 
Next Generation Sequencing of DNA
Next Generation Sequencing of DNANext Generation Sequencing of DNA
Next Generation Sequencing of DNA
 
A decade into Next Generation Sequencing on marine non-model organisms: curre...
A decade into Next Generation Sequencing on marine non-model organisms: curre...A decade into Next Generation Sequencing on marine non-model organisms: curre...
A decade into Next Generation Sequencing on marine non-model organisms: curre...
 
Ngs introduction
Ngs introductionNgs introduction
Ngs introduction
 
2011 jeroen vanhoudt_ngs
2011 jeroen vanhoudt_ngs2011 jeroen vanhoudt_ngs
2011 jeroen vanhoudt_ngs
 
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
 
Next generation sequencing technologies for crop improvement
Next generation sequencing technologies for crop improvementNext generation sequencing technologies for crop improvement
Next generation sequencing technologies for crop improvement
 
20160219 - S. De Toffol - Dal Sanger al NGS nello studio delle mutazioni BRCA
20160219 - S. De Toffol -  Dal Sanger al NGS nello studio delle mutazioni BRCA �20160219 - S. De Toffol -  Dal Sanger al NGS nello studio delle mutazioni BRCA �
20160219 - S. De Toffol - Dal Sanger al NGS nello studio delle mutazioni BRCA
 
Impact_of_gene_length_on_DEG
Impact_of_gene_length_on_DEGImpact_of_gene_length_on_DEG
Impact_of_gene_length_on_DEG
 
Clinical Application of RNA Sequencing - Bladder Cancer
Clinical Application of RNA Sequencing - Bladder CancerClinical Application of RNA Sequencing - Bladder Cancer
Clinical Application of RNA Sequencing - Bladder Cancer
 
New generation Sequencing
New generation Sequencing New generation Sequencing
New generation Sequencing
 
Assembly and finishing
Assembly and finishingAssembly and finishing
Assembly and finishing
 

Viewers also liked

Eiesenhardt l 177_final
Eiesenhardt l 177_finalEiesenhardt l 177_final
Eiesenhardt l 177_finalArtSci_center
 
Barseghyan h 177_final
Barseghyan h 177_finalBarseghyan h 177_final
Barseghyan h 177_finalArtSci_center
 
Bio Art Midterm Key
Bio Art Midterm KeyBio Art Midterm Key
Bio Art Midterm KeyArtSci_center
 
Nano biotech animals_2010
Nano biotech animals_2010Nano biotech animals_2010
Nano biotech animals_2010ArtSci_center
 
Davis spenser 177_final
Davis spenser 177_finalDavis spenser 177_final
Davis spenser 177_finalArtSci_center
 
Huang s 117_final
Huang s 117_finalHuang s 117_final
Huang s 117_finalArtSci_center
 
Turing ai rosie
Turing ai rosieTuring ai rosie
Turing ai rosieArtSci_center
 

Viewers also liked (7)

Eiesenhardt l 177_final
Eiesenhardt l 177_finalEiesenhardt l 177_final
Eiesenhardt l 177_final
 
Barseghyan h 177_final
Barseghyan h 177_finalBarseghyan h 177_final
Barseghyan h 177_final
 
Bio Art Midterm Key
Bio Art Midterm KeyBio Art Midterm Key
Bio Art Midterm Key
 
Nano biotech animals_2010
Nano biotech animals_2010Nano biotech animals_2010
Nano biotech animals_2010
 
Davis spenser 177_final
Davis spenser 177_finalDavis spenser 177_final
Davis spenser 177_final
 
Huang s 117_final
Huang s 117_finalHuang s 117_final
Huang s 117_final
 
Turing ai rosie
Turing ai rosieTuring ai rosie
Turing ai rosie
 

Similar to Turing nucleotidecryptology

DNA MICROARRAY TECHNOLOGY FOR PRINCIPLE OF DRUG DISCOVERY
DNA  MICROARRAY  TECHNOLOGY FOR  PRINCIPLE OF DRUG DISCOVERYDNA  MICROARRAY  TECHNOLOGY FOR  PRINCIPLE OF DRUG DISCOVERY
DNA MICROARRAY TECHNOLOGY FOR PRINCIPLE OF DRUG DISCOVERYDhanashri Prakash Sonavane
 
dnambdbdndndnfnefndnicroarray-201001142025.pdf
dnambdbdndndnfnefndnicroarray-201001142025.pdfdnambdbdndndnfnefndnicroarray-201001142025.pdf
dnambdbdndndnfnefndnicroarray-201001142025.pdfAzharAzhar63
 
DNA microarray
DNA microarrayDNA microarray
DNA microarraymanojjeya
 
DNA Microarray notes.pdf
DNA Microarray notes.pdfDNA Microarray notes.pdf
DNA Microarray notes.pdfRajendraChavhan3
 
DNA Microarray notes.pdf
DNA Microarray notes.pdfDNA Microarray notes.pdf
DNA Microarray notes.pdfRajendraChavhan3
 
605T_Phamaceutical biotecnology_unit 2.pptx
605T_Phamaceutical biotecnology_unit 2.pptx605T_Phamaceutical biotecnology_unit 2.pptx
605T_Phamaceutical biotecnology_unit 2.pptxAkhilesh Kumar
 
cloning and sub-cloning
cloning and sub-cloningcloning and sub-cloning
cloning and sub-cloningSandhya Talla
 
Microarray
MicroarrayMicroarray
Microarrayjain7177
 
Genetic technology presentation
Genetic technology presentationGenetic technology presentation
Genetic technology presentationNoorNoor138
 
A comprehensive study of microarray
A comprehensive study of microarrayA comprehensive study of microarray
A comprehensive study of microarrayPRABAL SINGH
 
Genetic Technology.pptx
Genetic Technology.pptxGenetic Technology.pptx
Genetic Technology.pptxDreamVisionNepal
 
Microarray technology.pptx
Microarray technology.pptxMicroarray technology.pptx
Microarray technology.pptxSUMAN92253
 
Microarray technique
Microarray techniqueMicroarray technique
Microarray techniquearunchacko14
 
Bioinformatics group presentation
Bioinformatics group presentationBioinformatics group presentation
Bioinformatics group presentationNaeem Ahmed
 
Bioinformatics group presentation
Bioinformatics group presentationBioinformatics group presentation
Bioinformatics group presentationNaeem Ahmed
 
General-Biology-2___Recombinant-DNA.pptx
General-Biology-2___Recombinant-DNA.pptxGeneral-Biology-2___Recombinant-DNA.pptx
General-Biology-2___Recombinant-DNA.pptxetonblue
 

Similar to Turing nucleotidecryptology (20)

Microbial physiology in genomic era
Microbial physiology in genomic eraMicrobial physiology in genomic era
Microbial physiology in genomic era
 
Gene cloning
Gene cloningGene cloning
Gene cloning
 
DNA MICROARRAY TECHNOLOGY FOR PRINCIPLE OF DRUG DISCOVERY
DNA  MICROARRAY  TECHNOLOGY FOR  PRINCIPLE OF DRUG DISCOVERYDNA  MICROARRAY  TECHNOLOGY FOR  PRINCIPLE OF DRUG DISCOVERY
DNA MICROARRAY TECHNOLOGY FOR PRINCIPLE OF DRUG DISCOVERY
 
Gene cloning
Gene cloningGene cloning
Gene cloning
 
dnambdbdndndnfnefndnicroarray-201001142025.pdf
dnambdbdndndnfnefndnicroarray-201001142025.pdfdnambdbdndndnfnefndnicroarray-201001142025.pdf
dnambdbdndndnfnefndnicroarray-201001142025.pdf
 
DNA microarray
DNA microarrayDNA microarray
DNA microarray
 
DNA Microarray notes.pdf
DNA Microarray notes.pdfDNA Microarray notes.pdf
DNA Microarray notes.pdf
 
DNA Microarray notes.pdf
DNA Microarray notes.pdfDNA Microarray notes.pdf
DNA Microarray notes.pdf
 
605T_Phamaceutical biotecnology_unit 2.pptx
605T_Phamaceutical biotecnology_unit 2.pptx605T_Phamaceutical biotecnology_unit 2.pptx
605T_Phamaceutical biotecnology_unit 2.pptx
 
cloning and sub-cloning
cloning and sub-cloningcloning and sub-cloning
cloning and sub-cloning
 
DNA microarray
DNA microarrayDNA microarray
DNA microarray
 
Microarray
MicroarrayMicroarray
Microarray
 
Genetic technology presentation
Genetic technology presentationGenetic technology presentation
Genetic technology presentation
 
A comprehensive study of microarray
A comprehensive study of microarrayA comprehensive study of microarray
A comprehensive study of microarray
 
Genetic Technology.pptx
Genetic Technology.pptxGenetic Technology.pptx
Genetic Technology.pptx
 
Microarray technology.pptx
Microarray technology.pptxMicroarray technology.pptx
Microarray technology.pptx
 
Microarray technique
Microarray techniqueMicroarray technique
Microarray technique
 
Bioinformatics group presentation
Bioinformatics group presentationBioinformatics group presentation
Bioinformatics group presentation
 
Bioinformatics group presentation
Bioinformatics group presentationBioinformatics group presentation
Bioinformatics group presentation
 
General-Biology-2___Recombinant-DNA.pptx
General-Biology-2___Recombinant-DNA.pptxGeneral-Biology-2___Recombinant-DNA.pptx
General-Biology-2___Recombinant-DNA.pptx
 

More from ArtSci_center

Jen-Ling Nieh Blog compilation
Jen-Ling Nieh Blog compilationJen-Ling Nieh Blog compilation
Jen-Ling Nieh Blog compilationArtSci_center
 
Lee s 177_final
Lee s 177_finalLee s 177_final
Lee s 177_finalArtSci_center
 
Jung e 177_final
Jung e 177_finalJung e 177_final
Jung e 177_finalArtSci_center
 
Borowski hnrs 177 final blog compilation
Borowski   hnrs 177 final blog compilationBorowski   hnrs 177 final blog compilation
Borowski hnrs 177 final blog compilationArtSci_center
 
Hnrs 177 midterm ppt
Hnrs 177 midterm pptHnrs 177 midterm ppt
Hnrs 177 midterm pptArtSci_center
 
Turing fibonacci numbers
Turing fibonacci numbersTuring fibonacci numbers
Turing fibonacci numbersArtSci_center
 
Xia j 177_final
Xia j 177_finalXia j 177_final
Xia j 177_finalArtSci_center
 
Ward e 177_final
Ward e 177_finalWard e 177_final
Ward e 177_finalArtSci_center
 
Tu nancy 177_final_small
Tu nancy 177_final_smallTu nancy 177_final_small
Tu nancy 177_final_smallArtSci_center
 
Microsoft word blogs-rozalin rabieian hrs177
Microsoft word   blogs-rozalin rabieian hrs177Microsoft word   blogs-rozalin rabieian hrs177
Microsoft word blogs-rozalin rabieian hrs177ArtSci_center
 
Madrigal j 177_final
Madrigal j 177_finalMadrigal j 177_final
Madrigal j 177_finalArtSci_center
 
Lai g 177_final
Lai g 177_finalLai g 177_final
Lai g 177_finalArtSci_center
 
Israel maximillian 177_final
Israel maximillian 177_finalIsrael maximillian 177_final
Israel maximillian 177_finalArtSci_center
 
Goodrich d 177_final
Goodrich d 177_finalGoodrich d 177_final
Goodrich d 177_finalArtSci_center
 
Davis m 177_final
Davis m 177_finalDavis m 177_final
Davis m 177_finalArtSci_center
 
Buccheri j 177_final
Buccheri j 177_finalBuccheri j 177_final
Buccheri j 177_finalArtSci_center
 
Barseghyan m 177_final
Barseghyan m 177_finalBarseghyan m 177_final
Barseghyan m 177_finalArtSci_center
 
Pablo p art_sci_midterm
Pablo p art_sci_midtermPablo p art_sci_midterm
Pablo p art_sci_midtermArtSci_center
 

More from ArtSci_center (20)

Jen-Ling Nieh Blog compilation
Jen-Ling Nieh Blog compilationJen-Ling Nieh Blog compilation
Jen-Ling Nieh Blog compilation
 
Lee s 177_final
Lee s 177_finalLee s 177_final
Lee s 177_final
 
Jung e 177_final
Jung e 177_finalJung e 177_final
Jung e 177_final
 
Borowski hnrs 177 final blog compilation
Borowski   hnrs 177 final blog compilationBorowski   hnrs 177 final blog compilation
Borowski hnrs 177 final blog compilation
 
Hnrs 177 midterm ppt
Hnrs 177 midterm pptHnrs 177 midterm ppt
Hnrs 177 midterm ppt
 
Turing fibonacci numbers
Turing fibonacci numbersTuring fibonacci numbers
Turing fibonacci numbers
 
Xia j 177_final
Xia j 177_finalXia j 177_final
Xia j 177_final
 
Turing wwii
Turing wwiiTuring wwii
Turing wwii
 
Ward e 177_final
Ward e 177_finalWard e 177_final
Ward e 177_final
 
Tu nancy 177_final_small
Tu nancy 177_final_smallTu nancy 177_final_small
Tu nancy 177_final_small
 
Microsoft word blogs-rozalin rabieian hrs177
Microsoft word   blogs-rozalin rabieian hrs177Microsoft word   blogs-rozalin rabieian hrs177
Microsoft word blogs-rozalin rabieian hrs177
 
Madrigal j 177_final
Madrigal j 177_finalMadrigal j 177_final
Madrigal j 177_final
 
Lai g 177_final
Lai g 177_finalLai g 177_final
Lai g 177_final
 
Israel maximillian 177_final
Israel maximillian 177_finalIsrael maximillian 177_final
Israel maximillian 177_final
 
Goodrich d 177_final
Goodrich d 177_finalGoodrich d 177_final
Goodrich d 177_final
 
Davis m 177_final
Davis m 177_finalDavis m 177_final
Davis m 177_final
 
Buccheri j 177_final
Buccheri j 177_finalBuccheri j 177_final
Buccheri j 177_final
 
Blog one
Blog oneBlog one
Blog one
 
Barseghyan m 177_final
Barseghyan m 177_finalBarseghyan m 177_final
Barseghyan m 177_final
 
Pablo p art_sci_midterm
Pablo p art_sci_midtermPablo p art_sci_midterm
Pablo p art_sci_midterm
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Turing nucleotidecryptology

  • 2. • Encrypting with DNA Janet Page • The Coding Dylan Goodrich • The Chemistry Spenser Davis • Biological Computing John Madrigal • From Hidden Messages to Memories HyakBarseghyan • Amplified Natural Intelligence Miriam Barseghyan • The Ethics Kelsey Knox
  • 3. Concept We were inspired by Alan Turing’s coding and decoding work he did for the military. We have developed an idea to create a code out of human DNA, insert that DNA into a cell and then insert the cell into a individual, creating a secure way to transfer information. The message is doubly protected by its encryption and then by its ability to be indistinguishable from the individual’s normal cells. We are using Nucleotide Cryptology to send hidden messages.
  • 4. Encrypting with DNA By: Janet Page
  • 5.  In the spirit of Alan Turing, we would like to offer a new method in which to encode messages.  Unlike other codes, our code will be biological, and will be encrypted in DNA itself.  Our method involves encoding a message using some sort of encryption with nucleotide sequences and implanting this sequence into the body of the messenger.  The receiving end will know where to look for this particular message.
  • 6. How can we convert English into nucleotide sequences?  Easiest method is a simple cipher: each English letter corresponds to a sequence of four nucleotides  Instead, we would like to use a cipher loosely based on a Vigenère Cipher, which would use 4 different conversions which switch off with every letter.
  • 7. Sample Cipher Encryption
  • 9. Layers of Protection Code Existence – Awareness of the code is likely to take a while due to the novelty of the idea Identifying “carriers” – Will be difficult to determine who has the code on their person. Could pretend to give people code so they do not know whether or not they have it. Reduces likelihood of betrayal or accidents
  • 10. Layers of Protection Location on the body – Will be difficult to isolate location of the injected cell colony. Could pretend to inject a carrier multiple times to prevent them from giving away relative location. Primer sequence – As discussed before the primer sequence is needed to isolate the area of DNA that contains the message. Can be made highly variable and complex
  • 11. Human Protection Tumor Prevention – Potential DNA code sequences will need to be tested to make sure that it does not induce uncontrolled proliferation within the carrier, thus putting him at risk. – DNA still needs to be able to allow for moderate cell replication to ensure safety of the cells containing the code
  • 12. Human Protection “Self Destruct” – Carrier cells will need to be highly sensitive to biological changes. If a person carrying a code dies then the cells with the code must be destroyed to prevent a prolonged search for them – If the enemy knows this then this will prevent them from killing carriers. Abuse or malnourishment may also stress the cells into dying, preventing these tactics against the carriers as well.
  • 14. The Chemistry Behind Nucleotide Cryptology • Before the injection of code, the data must be implemented into the genetic code of the messenger/storage person. DNA is extracted through a blood sample and an appropriate locus is determined for code insertion. It is important to choose a locus that does not code for any vital proteins, etc. Once chosen, the code will be inserted via PCR based site- directed mutagenesis (picture shown below).
  • 15.
  • 16. The Chemistry Behind Nucleotide Cryptology • The basic procedure requires the synthesis of a short DNA primer. This synthetic primer contains the desired mutation and is complementary to the template DNA around the mutation site so it can hybridize with the DNA in the gene of interest. The mutation may be a single base change (a point mutation), multiple base changes, deletion or insertion. The single-stranded primer is then extended using a DNA Polymerase, which copies the rest of the gene. The gene thus copied contains the mutated site, and is then introduced into a host cell as a vector and cloned. Finally, mutants are selected.
  • 17.
  • 18. The Chemistry Behind Nucleotide Cryptology • The original method using single-primer extension is inefficient due to a lower yield of mutants. The resulting mixture may contain both the original unmutated template as well as the mutant strand, producing a mix population of mutant and non-mutant progenies. The mutants may also be counter-selected due to presence of mismatch repair system which favors the methylated template DNA. Many approaches have since been developed to improve the efficiency of mutagenesis. The mutagenesis therefore would involve two sets of mutated primers flanking the desired region. And the selection method we could employ would be to include a simple antibiotic resistance gene in our mutation, then screen and select for mutants by plating on antibiotic+ plates and selecting surviving plaques. The DNA selected from the plaques would then be injected into the code carrier person.
  • 19. The Chemistry Behind Nucleotide Cryptology • The code decrypter would need to know the relative location of the cells in the body for extraction. Death will causes cell mitosis to fail and will thus ensure safe code delivery. Upon extraction of the code, the decrypter also needs to know either the primer sequence or the locus of interest to amplify via PCR then discover the sequence using gene probing microarrays. The way this works is as follows: pretend my code is AGTCGTC. This will only adhere to its complement TCAGCAG (let's ignore sticky ends and partial adherence for now). Microarray wells will contain randomized gene sequences such as: AGCTAGCA, AGTCTCGA, GCTAGCT, etc. However, only the true complement will bind to the coded sequence. It is in this way that the decrypter can uncover the true code. With a decryption key (cipher) already predetermined, the decrypter can decipher the message.
  • 20.
  • 21. Biological Computing By John Madrigal
  • 22. Moore’s Law • Technological trend where the amount of transistors doubles every 18 months • Experts believe that we are nearing a plateau and eventual block of continuing this trend
  • 23. DNA Computing • the use of DNA instead of silicon chips to solve complex mathematical problems • Research has been done to find a way to move past current computer technology for the future – Bacteria computer solves Hamiltonian Path Problem
  • 24. From Hidden Messages to Memories: Alternative uses for Nucleotide Cryptology By: HyakBarseghyan
  • 25. Memories Stored In DNA The human brain has the ability to store and transmit memories using images. There is a specialized area in the brain called the Hippocampus that is involved in the storage and generation of memories. The way memories are stored is still not quite understood. However, it is speculated that visual or any other stimuli that a person perceives is accompanied by the production of proteins in the brain that are involved in generation of new neuronal connections.
  • 26.
  • 27. It is possible to design a gene by genetic engineering and insert it into human cells using ballistics. A special air pressurized gun will shoot millions of copies of the desired gene into cells. Some of the engineered sequence will incorporate into the cell's genome. The inserted recombinant DNA in the cells will be transcribed and translated into a protein which will later be carried out from the cell into the bloodstream and taken into the brain, and will become involved in memory generation and retrieval.
  • 28.
  • 29. Depending on the design of the gene and its product the person will see different images appear in his/her imagination, starting from known pieces of art to any other custom generated memories. This technology will be crucial in using human genetic programming in information storage. Retrieval of the information can be performed using any human subject since the mechanism is the same from person to person.
  • 30.
  • 31. Amplified Natural Intelligence: More Applications for Biological Coding By: Miriam Barseghyan
  • 32. • In our modern society technological advances are not shocking anymore. It is expected for various electronics to be further developed in order to achieve better device capabilities. However, while on the path creating Artificial Intelligence, we tend to neglect our own intellectual development.
  • 33. • Behavioral modifications, particularly education, do tend to improve the level of human intelligence. However, this process is slow and requires constant work. As the new generations of computers that come out with improved functionality, it would be possible to create human beings with improved analytical and logical power.
  • 34.
  • 35. • In the core of the model of creation of humans with Amplified Natural Intelligence (ANI) lies the concept of decoding a given code (by Alan Turing) and those of physiology and molecular biology. To achieve the proposed goal Human Genetic Engineering (HGE) is necessary. Genes need to be modified at an embryonic level in order to produce functional cells postnatally. Retroviral transfecton would be the core technique utilized in procedure. Through this technique, extra genes coding for Nerve Growth Factors (NGF) and molecules guiding axonal patterning, such as molecules from the Ephrinfamily, as well as genetic information coding for molecules that increase neuronal synaptic connectivity will be inserted into the embryonic genome during the early stages of embryonic development.
  • 36.
  • 37. • The inserted code will be decoded by the natural mechanisms of the organism to produce exogenous molecules. These molecules will further amplify the effects of the endogenous molecules involved in nervous system development. Thus, neurogenesis along with axonal and synaptic efficient patterning will contribute to creation of ANI.
  • 39. “Genethics”: the idea that problems for humanity and the world posed by the new genetic technology are novel and consequently a new kind of ethics is needed (1) As our project deals with inserting modified DNA into a human cell, and then putting that cell back in a human, ethical issues surrounding gene technologies are a major consideration. 1. http://bioinformatics.istge.it/bcd /ForAll/Ethics/welcome.html 2. Photo via http://thetechnologicalcitizen.co m/?p=1022
  • 40. Potential “genethical” issues • “playing god” • Unsure consequences • Informed consent • Ownership of genetic code • Objectification/devaluat ion of the individual