Académique Documents
Professionnel Documents
Culture Documents
net/publication/227268565
CITATIONS READS
110 911
4 authors, including:
Xuejia Lai
Shanghai Jiao Tong University
135 PUBLICATIONS 3,194 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Xuejia Lai on 29 November 2016.
methods, while the efficiency of DNA hybridization is led by Adleman solved a 3-SAT problem with more
improved greatly with DNA chip technology. These than 1 million possibilities on a simple DNA computer
two important technologies will be briefly introduced in after an exhaustive searching[13]. In 2005,it is declared
this paper.
that a team led by Ehud Keinan invented a biomolecu-
Polymerase Chain Reaction (PCR) was invented in
lar computer that used little more than DNA and en-
1983. It is one of the most important invention in mod- zymes could perform a billion operations simultane-
ern biology[3]. Since the DNA molecule is tiny in vol-
ously[14]. Adleman reviewed DNA computing as fol-
ume, it is difficult to manipulate a small quantity of
lows: “For thousands of years, humans have tried to
given DNA directly, while it will be quite easy to ma-
enhance their inherent computational abilities using
nipulate a great mount of DNA after amplification.
manufactured devices. Mechanical devices such as the
PCR is a fast DNA amplification technology based on
abacus, the adding machine, and the tabulating machine
Watson-Crick complementarity. Two complementary
were important advances. But it was only with the ad-
oligonucleotide primers are annealed to double-
vent of electronic devices and, in particular, the elec-
stranded target DNA strands, and the necessary target
tronic computer some 60 years ago that a qualitative
DNA can be amplified after a serial of polymerase re-
action from 5′ to 3′ with the aid of polymerase enzyme. threshold seems to have been passed and problems of
The PCR is a very sensitive method, and in theory a considerable difficulty could be solved. It appears that a
single target DNA molecule can be amplified to 106 molecular device has now been used to pass this quali-
after 20 cycles. Thus one can effectively amplify a lot tative threshold for a second time.”[13] Scientists have
of DNA strands within a very short time [3]. also made progress in the theory of DNA computing
DNA chip is also known as DNA microarray or gene and explored several feasible computing models, such
chip or oligonucleotide chip or biological chip, which is as the model used by Adleman in 1994[8]. Here it is
fabricated with in situ synthesized oligo nucleic acids called Hamiltonian path model, and the model based on
or spotted cDNA probes according to published meth- DNA chip[14,15] and the sticker model proposed by
ods of Fodor and Brown[4 7]. Tens of thousands, even
- Adleman[16]. Below, the widely used Hamiltonian path
millions of DNA probes are arranged in a square area model and sticker model are briefly introduced.
less than 1 square inch on glass or silicon matrix. And 2.1 Hamiltonian Path Model
as their counterparts, numerous labelled probes are
used to anneal with probes on the chip to get various In 1994, Adleman used DNA computing to solve an
hybridization spectrums revealing genetic information. instance of the directed Hamiltonian path problem[8].
Thus the hybridization efficiency can be raised thou- The computing model proposed by Adleman is also
sands of times and even more. used by Lipton to solve SAT problems[17]. The Hamil-
tonian path problem is to find a path that begins at vin,
2 DNA computing ends at vout and enters every other vertex exactly once
The development of DNA cryptography benefits on a directed graph. For each vertex i in the graph, a
from the progress of DNA computing (also called mo- random 20-mer oligonulecotide (short DNA strand) Oi
lecular computing or biological computing). On the one was generated. Here, mer is the long measure of oli-
hand, cryptography always has some relationship with gonulecotide. The following O2, O3 and O4 denote
the corresponding computing model more or less. On vertices 2, 3, and 4, respectively. All the following oli-
the other hand, some biological technologies used in gonucleotides are written from 5′ to 3′.
DNA computation are also used in DNA cryptography.
O2 = TATCGGATCGGTATATCCGA,
For these reasons, DNA computing is briefly intro-
duced here. O3 = GCTATTCGAGCTTAAAGCTA,
In fact, it is not correct that only the encoding rule is logical experiments have to be done in encryption step
considered key in Fig. 4. The true key should be prim- and decryption step, such as synthesizing message
ers and encoding rule. DNA strands, conducting PCR amplification and se-
quencing. Such experiments can only be done in a well
3.2 Main problems
equipped lab using current technology. For these rea-
The progress in the world shows that the research of sons, DNA cryptosystems are not convenient in prac-
present DNA cryptography is mainly confronted with tice and cannot compete with traditional cryptosystems.
the following problems: Luckily, modern biology has made much headway in
(i) Lack of the related theoretical basis. In 1949, recent twenty years. Many expensive experiments in
Shannon proposed the basic model and development the past have become routine experiments. With the
direction for modern privacy communication in his fa- further development of biology and new design of
mous paper “Communication theory of secrecy sys- DNA cryptosystem, the problems of “difficult and
tems”[23]. In the 1970s, it is proposed that the complex- expensive to realize” can be solved.
ity theory should be used as a powerful tool for design-
ing encryption algorithms, which also makes the emer- 4 Comparisons among DNA cryptography, tradi-
gence of public-key cryptosystem possible[24]. In the tional cryptography and quantum cryptography
following decades, new cryptosystems such as RSA,
EIGamal, DES and AES are invented[25 28]. Thus, the
- 4.1 Development
traditional cryptography is perfected more and more. In Traditional cryptography can be traced back to Cae-
contrast, for DNA cryptography there is no mature cor- sar cipher 2000 years ago or even earlier. Related the-
responding theory. It is still an open problem as to what ory is almost sound. All the practical ciphers can be
are the model and security basis of DNA cryptography, seen as traditional ones. Quantum cryptography came
say nothing of the implementations. For lack of related into being in the 1970s, and the theory basis has been
theory it is difficult to design good DNA cryptographic prepared while implementation is difficult. By and
schemes. large, they have not been plunged into practical use.
(ii) Difficult to realize and expensive to apply. For DNA cryptography has only nearly ten years history,
the existing DNA cryptography schemes, many bio- the theory basis is under research and the application