DNA Computing BY DIVYA TADESERA. Contents  Introduction  History and its origin  Relevancy of DNA computing in 1. Hamilton path problem(NP problem)

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Time Complexity P vs NP.
Ashish Gupta Ashish Gupta Unremarkable Problem, Remarkable Technique Operations in a DNA Computer DNA : A Unique Data Structure ! Pros.
DNA Computing COMP308 I believe things like DNA computing will eventually lead the way to a “molecular revolution,” which ultimately will have a very dramatic.
DNA Computation Hiroshi Higuchi.
Enrique Blanco - imim.es © 2006 Enrique Blanco (2006) A few ideas about DNA computing.
DNA Computing Computation with the Code of Life Michael Ang Interactive Telecommunications Program New York University February 16,
Montek Singh COMP Nov 15,  Two different technologies ◦ TODAY: DNA as biochemical computer  DNA molecules encode data  enzymes, probes.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
Presented By:- Anil Kumar MNW-882-2K11
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
SEMINAR ON BIOMOLECULAR COMPUTING
Nucleic Acid Structure Many thanks to Dave Bevan for providing some of the material for this lecture.
DNA Computing on a Chip Mitsunori Ogihara and Animesh Ray Nature, vol. 403, pp Cho, Dong-Yeon.
Difficult Problems. Polynomial-time algorithms A polynomial-time algorithm is an algorithm whose running time is O(f(n)), where f(n) is a polynomial A.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Beyond Silicon: Tackling the Unsolvable with DNA.
1 Computing with DNA L. Adelman, Scientific American, pp (Aug 1998) Note: This ppt file is based on a student presentation given in October, 1999.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography, Authentication and Digital Signatures
Algorithms and Running Time Algorithm: Well defined and finite sequence of steps to solve a well defined problem. Eg.,, Sequence of steps to multiply two.
Network Encryption Vince Ceccarelli Group 7 TC 200.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
BIO COMPUTERS. INTRODUCTION  Growing needs of mankind-Rapid Development.  Rapid advancement in computer technology will lose its momentum when silicon.
BY: DANE GREER AND JAKE PROEHL DNA COMPUTING. DNA DNA Strands ATGC (adenine, thymine, guanine and cytosine) Polymerase.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Public Key Encryption.
What is DNA Computing? Shin, Soo-Yong Artificial Intelligence Lab.
Computing with DNA Many thanks to Dave Bevan for providing some of the material for this lecture.
DNA COMPUTING SUBMITTED BY::: VIKAS AGARWAL CO-2.
Georgia Institute of Technology Speed part 6 Barb Ericson Georgia Institute of Technology May 2006.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
PROCESSING DNA TOKENS IN PARALLEL COMPUTING Presented by Sapnah Aligeti Midwestern State University 27 June 2005.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Limits to Computation How do you analyze a new algorithm? –Put it in the form of existing algorithms that you know the analysis. –For example, given 2.
DNA computing on a chip Mitsunori Ogihara and Animesh Ray Nature, 2000 발표자 : 임예니.
(Potentials and advancements) Submitted to - Presented by- Mrs. Neeta Nain Vikas Kumar Khichar Mrs. Namita Mittal 2008ucp149 1 VI Semester(CP-2)
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
General, Organic, and Biological Chemistry Copyright © 2010 Pearson Education, Inc.1 Chapter 21 Nucleic Acids and Protein Synthesis 21.3DNA Double Helix.
Cornell Notes. Essential Questions (Eqs) 1) What is DNA? 2) What is the function and importance of DNA for all organisms? 3) What is the basic structure.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Some simple basics. 1Introduction 2Theoretical background Biochemistry/molecular biology 3Theoretical background computer science 4History of the field.
Introduction to molecular biology Data Mining Techniques.
DNA Computing Guided by: Ms. Leena Patel Computer Engineering Prepared by: Devharsh Trivedi
Kavita Maurya (MT15032) Meetika Anand (MT15033). OUTLINE Introduction About DNA Why we are preferring DNA as an information storage device? How information.
DNA Computing. What is it?  “DNA computing is a branch of computing which uses DNA, biochemistry, and molecular biology hardware, instead of the traditional.
A PRESENTATION ON DNA COMPUTING Presented By SOMYA JAIN.
Security Using Armstrong Numbers and Authentication using Colors
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Happy Wednesday! – 10/30 Last year Roman was shorter than his brother. This year Roman is taller than his brother. What cell process is directly responsible.
DNA All life on earth uses a chemical called DNA to carry its genetic code or blueprint. In this lesson we be examining the structure of this unique molecule.
DNA Replication Notes.
DNA Replication Notes.
One Way Functions Motivation Complexity Theory Review, Motivation
By:- Manas Pandey Electrnics & Communication Roll No
DNA.
Secret-Key Encryption
Presentation transcript:

DNA Computing BY DIVYA TADESERA

Contents  Introduction  History and its origin  Relevancy of DNA computing in 1. Hamilton path problem(NP problem) 2. Cryptography 3. Steganography  Advantages

Introduction  DNA(Deoxyribonucleic acid) is the genetic blueprint of any organism.  Strands of DNA are long polymers of millions of linked nucleotides.  The nucleotides that make up these polymers are named after the nitrogen base that it consists of; Adenine (A), Cytosine (C), Guanine (G) and Thymine (T).  These nucleotides will only combine in such a way that C always pairs with G and T always pairs with A.  Therefore it is also known as Molecular computing.

Cont’d..  DNA computing or molecular computing are terms used to describe utilizing the inherent combinational properties of DNA for massively parallel computation.  enough DNA, one can potentially solve huge mathematical problems by parallel search.  This tells us that a man can compute more faster than a conventional computer which uses more hardware for massive parallelism

History and its origin  In early 1994, Adleman put his theory of DNA computing to test on a problem called the Hamiltonian Path problem also known as Traveling Salesman Problem.  Adleman’s DNA computing test is first done on a NP problem since it is a type of problem that is difficult for conventional computers to solve.

Hamilton path problem  Hamilton path problem is a non-deterministic polynomial time problem (NP).  As we need to check all possible solutions in order to get the correct answer the problem is termed to be non deterministic.  Any algorithm that runs on a non-deterministic machine in polynomial time is called a nondeterministic polynomial time problem

Hamilton path problem ‘Traveling Salesman’ Problem representing the 7 cities and one way streets between them

Rules:  1. The path must start at city A and end at city G.  2. Of those paths, the correct paths must pass through all 7 cities at least once.  3. The final path(s) must contain each city in turn.

Cont’d..  The ‘correct’ answer was determined by filtering the strands of DNA according to their end-bases to determine which strands begin from city A and end in city G and discarding those that did not.  The remaining strands were then measured through electrophoretic techniques to determine if the path they represent has passed through all 7 cities.

Cont’d..  Finally the resulting sets of strands were examined individually to determine if they contained each city in turn. That strand or strands that remained was then determined to be the answer or equivalent answers  These resulting individual strands are then combined in opposite directions to form DNA that is able to handle massive parallelism

Cryptography  Cryptography is a kind of secret writing(hiding the messages which we wish to).  It scrambles plaintext (ordinary text) into ciphertext (encrypted text)known as encryption and then back again from encrypted to plain text known as decryption.

Public Key Encryption

 DNA is also termed as information carrier.  DNA computing may not be fast but it is massively parallel. With the right kind of setup, it has the potential to solve huge mathematical problems.  DNA computing represents a serious threat to various powerful encryption schemes such as the Data Encryption Standard (DES).

Cont’d..  As we know that DNA can be used to break codes then it is clear that it can encrypt data.  Various groups have suggested using the sequence of nucleotides in DNA (A for 00, C for 01, G for 10, T for 11) for just this purpose.  One idea is to not even bother encrypting the information but simply burying it in the DNA so it is well hidden, a technique called DNA steganography.

Steganography  cryptography is the practice of protecting the contents of a message alone.  steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message.  In order to synthesize a secret-message DNA containing an encoded message 69 nucleotides long flanked by forward and reverse PCR primers, each 20 nucleotides long

Cont’d..  We prepare a concealing DNA that is physically similar to the secret-message DNA by adding with a 56 bit key.  Doing this way, secures unique DNA configuration that is able to perform massive parallelism.  Although this problem has already been solved using conventional techniques in a much shorter time than proposed by the DNA methods, the DNA models are much more flexible, potent, and sender of cost effective.

Advantages  Speed – Conventional computers can perform approximately 100 MIPS (millions of instruction per second). On the other hand DNA computers(humans) can perform 100 times faster than the fastest computer.  Minimal Storage Requirements – DNA stores memory at a density of about 1 bit per cubic nanometer where conventional storage media requires cubic nanometers to store 1 bit.  Minimal Power Requirements – As DNA doesn’t require any power source there is no comparison with the conventional computers that use.

Limitations  It requires an exponential resource in terms of memory. Although DNA can store a trillion times more information than current storage media, the way in which the information is processed necessitates a massive amount of DNA if larger-scale problems are to be solved.  DNA strand synthesis is liable to errors, such as mismatching pairs, and is highly dependent on the accuracy of the enzymes involved.

Conclusion  Conventional computers and their software updates in future, results in building up cholesterol levels in persons arteries.  It is obvious that DNA computers are more flexible.

References  practices-future-genes/ practices-future-genes/  science-of-dna-cryptography/ science-of-dna-cryptography/ 

THANK YOU