23.07.2013 Views

Data Encryption Based On Protein Synthesis - Nguyen Dang Binh

Data Encryption Based On Protein Synthesis - Nguyen Dang Binh

Data Encryption Based On Protein Synthesis - Nguyen Dang Binh

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Like DNA, RNA is composed of nucleotide bases.<br />

RNA however, contains the nucleotides adenine,<br />

guanine, cytosine and uricil (U) [5]. When RNA<br />

polymerase transcribes the DNA, guanine joins with<br />

cytosine and adenine joins with uricil. RNA<br />

polymerase moves along the DNA until it reaches a<br />

terminator sequence. At that point, RNA polymerase<br />

releases the mRNA polymer and detaches from the<br />

DNA [5, 8].<br />

The outline of this stage involves following steps:<br />

• DNA unwinds.<br />

• RNA polymerase recognizes a specific<br />

base sequence in the DNA called a promoter and<br />

binds to it. The promoter identifies the start of a<br />

gene, which strand is to be copied, and the direction<br />

that it is to be copied.<br />

• Complementary bases are assembled<br />

(U instead of T).<br />

• A termination code in the DNA indicates<br />

where transcription will stop.<br />

The mRNA produced is called an mRNA<br />

transcript.<br />

2.4 Translation<br />

The next step is to produce a chain of amino<br />

acids based on the sequence of nucleotides in the<br />

mRNA. The nucleotide sequence of an mRNA<br />

molecule is read from one end of mRNA to the other,<br />

in groups of three successive bases previously<br />

named codons. In the cytoplasm, mRNA combines<br />

with one or more ribosomes. Ribosomes act as<br />

catalysts to assemble individual amino acids into<br />

polypeptide chains. Ribosomes contain a small and<br />

a large subunit. Each subunit contains rRNA of<br />

varying length and a set of proteins. <strong>On</strong>e portion of<br />

the mRNA molecule attaches to the smaller subunit<br />

and a tRNA with its amino acid attaches to the other<br />

subunit, thus the codon of the mRNA attracts a<br />

complementary anticodon on the tRNA. This<br />

codon-anticodon matching brings a specified amino<br />

acid into position [5].<br />

After pairing with mRNA, the tRNA amino-acid is<br />

held in a vice-like grip on the ribosome’s larger<br />

subunit. Then ribosome moves on to the new<br />

location along the mRNA to repeat the same process<br />

again. Second tRNA now approaches the ribosome<br />

and pairs its anti codon with the second codon of<br />

mRNA. Thus two tRNA molecules and their amino<br />

acids stand next to one another on the mRNA. In a<br />

fraction of a second these two amino acids are<br />

joined together by a special enzyme to form a<br />

dipeptide. Now the first tRNA is freed and moves<br />

back to the cytoplasm leaving the amino acid<br />

attached to the second amino acid. Ribosome, then,<br />

proceeds by moving along the mRNA and doing the<br />

same process again until it reaches the final one or<br />

two codons of the mRNA which are chain<br />

terminators or stop signals. The polypeptide bond is<br />

formed by removal of water between amino acids.<br />

Now the polypeptide is released from ribosome and<br />

will coil to yield the functional protein [5].<br />

3. <strong>Data</strong> <strong>Encryption</strong><br />

From the protein synthesis process, three factors<br />

are taken for granted for proposed encryption<br />

algorithm. Amino acids represent our basic units of<br />

data, combinations of these basic units produce the<br />

codes, which is codon in protein synthesis, and<br />

codon tables serve the purpose of coding table (refer<br />

to figure2).<br />

These concepts are expanded in the following<br />

lines.<br />

3.1 <strong>Data</strong> Unit<br />

Digital computers operate zeroes and ones,<br />

meaning that entire data that computers are<br />

processing to surprise human race, are enormous<br />

amounts of information in the form of binary digits.<br />

However, in order to construct coding tables, bits<br />

cannot represent appropriate data units due to their<br />

not having enough semantic weight. Instead, an<br />

alternative is to consider an array of 8 bits, which is a<br />

“Bite”. The advantage of this option is that we are<br />

dealing with 256 different states rather than 2 states<br />

of the former scheme. By encrypting these Bites<br />

entire data will be encoded.<br />

3.2. Coding <strong>Data</strong> Units and Table of Codes<br />

With regard to figure 2, the combinations of four<br />

elements (i.e. U, C, A, G) and 3 positions provides<br />

4 3 =64 states from which almost twenty amino acids<br />

are produced while more than one codon for some<br />

unit (amino acid) is used. To enhance the coding<br />

efficiency, appropriate number of elements should<br />

be combined together in appropriate number of<br />

positions to cater for n number of states. Two<br />

methods are suggested differing in their output:<br />

In the first method every two bits are<br />

assumed one element. Because 2 bits account for 4<br />

states (i.e. 00, 01, 10, 11) there are 4 different 2 bit<br />

elements in one bite. So 4 4 =256 states. Figure 3<br />

illustrates this coding scheme.<br />

In the second method, similar to the<br />

previous scheme, there are 4 elements in one bite;<br />

the difference, however, is that in the second method<br />

each of 00, 01, 10, 11 are assigned to an alphabetic<br />

letter. Simply stated, the outcome is the<br />

combinations of 4 letters. Again 4 4 =256.(we will refer<br />

to this mechanism throughout the paper as second<br />

method) Figure 4 illustrates this coding scheme.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!