Talk:CH391L/S13/DNA Computing

From OpenWetWare

(Difference between revisions)
Jump to: navigation, search
Line 4: Line 4:
*'''[[User:Jeffrey E. Barrick|Jeffrey E. Barrick]] 16:42, 1 April 2013 (EDT)''':DNA cryptography?
*'''[[User:Jeffrey E. Barrick|Jeffrey E. Barrick]] 16:42, 1 April 2013 (EDT)''':DNA cryptography?
**'''[[User:Siddharth Das|Siddharth Das]] 16:45, 1 April 2013 (EDT)''':  
**'''[[User:Siddharth Das|Siddharth Das]] 16:45, 1 April 2013 (EDT)''':  
-
 
+
**'''[[User:Benjamin Gilman|Benjamin Gilman]] 17:15, 3 April 2013 (EDT)''': It's kind of out there, but DNA sequences could be pretty useful as key pads for decrypting a [http://en.wikipedia.org/wiki/Vernam_cipher Vernam Cipher].  DNA pieces can be generated randomly, copied accurately, and destroyed if necessary.  Although it's not truly random, just taking an existing sequence block (like a chunk of a genome from NCBI) would be close enough to make the cipher difficult to break.  Maybe someday spies will be carrying tubes of DNase around with them.
*'''[[User:Kevin Baldridge|Kevin Baldridge]] 16:45, 1 April 2013 (EDT)''':I think I might have shared this paper before, but it is very directly related to some of the topics you discuss here [http://www.ncbi.nlm.nih.gov/pubmed/22722847 Single Cell Programmable Biocomputers]
*'''[[User:Kevin Baldridge|Kevin Baldridge]] 16:45, 1 April 2013 (EDT)''':I think I might have shared this paper before, but it is very directly related to some of the topics you discuss here [http://www.ncbi.nlm.nih.gov/pubmed/22722847 Single Cell Programmable Biocomputers]

Revision as of 16:15, 3 April 2013

  • Kevin Baldridge 16:39, 1 April 2013 (EDT):How did he select against those which were not applicable? The combinatorial approach that gave all possible answers yields so many possibilities, I don't see how this is any improvement over traditional computer brute force approach if you can't eliminate the problem of selecting possible answers.
    • Siddharth Das 16:39, 1 April 2013 (EDT): Granted this methodology isn't an elegant as computations conducted by normal computers, but "brute force" allows find solutions for highly combinatorial problems. In other words, DNA computing vs electronic computing is in essence memory vs. time, respectively. The amount of memory an electronic computer needs to allocate to solve a problem would never fulfill the requirements to screen for solutions such as combinatorial, factorization, and etc. For example in RSA cryptography, basically packages of data are stored in prime numbers (795028841 X 25209506681 = 20042284878777186721) shared between two parties. As an "eavesdropper", the number 20042284878777186721 (lock) means nothing to you and thus prompts you to factorize the incredibly huge number. Without using the RSA algorithm (key), the eavesdropper must rely on simply "brute forcing" the decryption process which is where DNA computing would be advantageous.
  • Jeffrey E. Barrick 16:42, 1 April 2013 (EDT):DNA cryptography?
    • Siddharth Das 16:45, 1 April 2013 (EDT):
    • Benjamin Gilman 17:15, 3 April 2013 (EDT): It's kind of out there, but DNA sequences could be pretty useful as key pads for decrypting a Vernam Cipher. DNA pieces can be generated randomly, copied accurately, and destroyed if necessary. Although it's not truly random, just taking an existing sequence block (like a chunk of a genome from NCBI) would be close enough to make the cipher difficult to break. Maybe someday spies will be carrying tubes of DNase around with them.
  • Kevin Baldridge 16:45, 1 April 2013 (EDT):I think I might have shared this paper before, but it is very directly related to some of the topics you discuss here Single Cell Programmable Biocomputers
Personal tools