S. H. Jiao et al. / Natural Science 1 (2009) 181-184
SciRes Copyright © 2009 http://www.scirp.org/journal/NS/
184
8. CONCLUSIONS
T C A C A C G G A G G C C C A C C C
Ser His Gly Gly Pro Pro
new peptidic chain. With the chain we can retrieve the
three codons of the short list
The use of the degeneracy of the genetic code and, in par-
ticular, the silent mutations, produces coding that does not
practically alter the properties of the inserted gene, nor the
characteristics of the host genome (very important condi-
tions when we working with the live organisms). Memori-
zation of the key information and the production of the
hidden message in the form of a physical polypeptide pro-
vide additional data transfer security, while the coding
protocol is being implemented).
For this, it is sufficient to conserve uniquely two
bases/in each codon.
T C C A G G G G C C C C and to regroup:
T C G G C C
C A G G C C
T C A G G G C C C
DNA is a storage medium extremely effective: it is com-
pact and his signature is innocuousness and secrecy. In the
spore form, Bacillus subtilis is resistant to extremes terres-
trial and extraterrestrial environment during the interstellar
travel, for example (ref 10). In the nearly future, this bio-
engineering method can be used in routine, for protection
of the gene patents, digital copyrights and tool for the
marking in biodiversity
for obtain the three original codons.
7.2. Comp lem ents
It is possible to associate this encryption method with
a binary encryption algorithm (AES, RSA, Blow-
fish). In this case, the inserted message is not the clear
version, but a secure version after using these specific al-
gorithms.
7.3. Simplified Version REFERENCES
If, in spite of the precaution to using silent mutations dur-
ing the identification of genetically modified organisms,
residual biological changes still exist in the host organism,
then a simplified version of the method discussed above
can be used.
[1] C. C. Taylor, V. Risca, and C. Bancroft, (1999) Hiding
messages in DNA microdots. Nature, 399, 533-534.
[2] C. Bancroft, T. Bowler, B. Bloom, and C. C. Taylor
(2001) Long-term storage of information in DNA. Sci-
ence, 293(5536), 1763-1765.
From the gene initially modified by the agrochemical
firm (if this gene is accessible to the user), we propose to
use this gene as stegomedium, to produce a custom key.
This key can allow access to the reference of manufacturer.
With this goal in mind, in the preceding example (with the
message “CODING” of 48bits), we select 24 codons of the
70 existing in the tatAD gene.
[3] G
. C. Smith, C. C. Fiddes, J. P. Hawkins, and J. P. L. Cox,
(2003) Some possible codes for encrypting data in DNA.
Biotechnology, 25 , 1125-1130.
[4] B. Shimanovsky, J. Feng, and M. Potkonjak, (2003)
Hiding data in DNA, LNCS 2578, 373-386.
[5] P. C. Wong, K. K. Wong, and H. Foote, (2003) Organic
data memory using the DNA approach, Communication
of the ACM, 46(1).
Each codon selected is identified by its rank in the chain
(7 bits per codons are necessary, here corresponding to a
total of 24x7=168 bits). These 168 bits are the customized
key (customizations results from the different possible
orders in this gene’s chain), The last base of the codon
selected (A,T,C or G) allows access to the bits 01, 10 ,00,
11 that form the message. It is important to note that the
marker gene is not altered by this operation. Information
on origin and dates of manufacture concerning these seeds
can be obtained. Security comes both the use of the key
and the specific nature of the changes, made voluntarily by
the manufacturer on the original gene, for obtain the de-
sired biological effects.
[6] M. Arita and Y. Ohashi, (2005) Secret signature inside
genomic DNA biotechnol. Prog, 20 (5), 1605-1607.
[7] K.Tanaka, A. Okamoto, and I. Saito, (2005) Public-key
system using DNA as a one way function for key distri-
bution. Biosystems, 81(1), 25-29.
[8] N. Yachie, K. Sekiyma, J. Sugahara, Y. Ohashi, and M. To-
mita, (2007) Alignment-based approach for durable data
storage into living organisms biotechnol. Prog., 23, 501-505.
[9] D. Heider and A. Barnekow, (2007) DNA-based water-
marks using the DNA-Crypt algorithm, BMC Bioinfor-
matica, 8, 176.
[10] W. L. Nison, N. Munakata, G. Horneck, H. J. Melosh,
and P. Setlow, (2000) Resistance of Bacillus endospores
to extreme terrestrial and extraterrestrial environments.
Micbiol. Mol. Bio. Rev., 64(3), 548-57.
Openly accessible at