Data Encryption Based On Protein Synthesis - Nguyen Dang Binh
Data Encryption Based On Protein Synthesis - Nguyen Dang Binh
Data Encryption Based On Protein Synthesis - Nguyen Dang Binh
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Like DNA, RNA is composed of nucleotide bases.<br />
RNA however, contains the nucleotides adenine,<br />
guanine, cytosine and uricil (U) [5]. When RNA<br />
polymerase transcribes the DNA, guanine joins with<br />
cytosine and adenine joins with uricil. RNA<br />
polymerase moves along the DNA until it reaches a<br />
terminator sequence. At that point, RNA polymerase<br />
releases the mRNA polymer and detaches from the<br />
DNA [5, 8].<br />
The outline of this stage involves following steps:<br />
• DNA unwinds.<br />
• RNA polymerase recognizes a specific<br />
base sequence in the DNA called a promoter and<br />
binds to it. The promoter identifies the start of a<br />
gene, which strand is to be copied, and the direction<br />
that it is to be copied.<br />
• Complementary bases are assembled<br />
(U instead of T).<br />
• A termination code in the DNA indicates<br />
where transcription will stop.<br />
The mRNA produced is called an mRNA<br />
transcript.<br />
2.4 Translation<br />
The next step is to produce a chain of amino<br />
acids based on the sequence of nucleotides in the<br />
mRNA. The nucleotide sequence of an mRNA<br />
molecule is read from one end of mRNA to the other,<br />
in groups of three successive bases previously<br />
named codons. In the cytoplasm, mRNA combines<br />
with one or more ribosomes. Ribosomes act as<br />
catalysts to assemble individual amino acids into<br />
polypeptide chains. Ribosomes contain a small and<br />
a large subunit. Each subunit contains rRNA of<br />
varying length and a set of proteins. <strong>On</strong>e portion of<br />
the mRNA molecule attaches to the smaller subunit<br />
and a tRNA with its amino acid attaches to the other<br />
subunit, thus the codon of the mRNA attracts a<br />
complementary anticodon on the tRNA. This<br />
codon-anticodon matching brings a specified amino<br />
acid into position [5].<br />
After pairing with mRNA, the tRNA amino-acid is<br />
held in a vice-like grip on the ribosome’s larger<br />
subunit. Then ribosome moves on to the new<br />
location along the mRNA to repeat the same process<br />
again. Second tRNA now approaches the ribosome<br />
and pairs its anti codon with the second codon of<br />
mRNA. Thus two tRNA molecules and their amino<br />
acids stand next to one another on the mRNA. In a<br />
fraction of a second these two amino acids are<br />
joined together by a special enzyme to form a<br />
dipeptide. Now the first tRNA is freed and moves<br />
back to the cytoplasm leaving the amino acid<br />
attached to the second amino acid. Ribosome, then,<br />
proceeds by moving along the mRNA and doing the<br />
same process again until it reaches the final one or<br />
two codons of the mRNA which are chain<br />
terminators or stop signals. The polypeptide bond is<br />
formed by removal of water between amino acids.<br />
Now the polypeptide is released from ribosome and<br />
will coil to yield the functional protein [5].<br />
3. <strong>Data</strong> <strong>Encryption</strong><br />
From the protein synthesis process, three factors<br />
are taken for granted for proposed encryption<br />
algorithm. Amino acids represent our basic units of<br />
data, combinations of these basic units produce the<br />
codes, which is codon in protein synthesis, and<br />
codon tables serve the purpose of coding table (refer<br />
to figure2).<br />
These concepts are expanded in the following<br />
lines.<br />
3.1 <strong>Data</strong> Unit<br />
Digital computers operate zeroes and ones,<br />
meaning that entire data that computers are<br />
processing to surprise human race, are enormous<br />
amounts of information in the form of binary digits.<br />
However, in order to construct coding tables, bits<br />
cannot represent appropriate data units due to their<br />
not having enough semantic weight. Instead, an<br />
alternative is to consider an array of 8 bits, which is a<br />
“Bite”. The advantage of this option is that we are<br />
dealing with 256 different states rather than 2 states<br />
of the former scheme. By encrypting these Bites<br />
entire data will be encoded.<br />
3.2. Coding <strong>Data</strong> Units and Table of Codes<br />
With regard to figure 2, the combinations of four<br />
elements (i.e. U, C, A, G) and 3 positions provides<br />
4 3 =64 states from which almost twenty amino acids<br />
are produced while more than one codon for some<br />
unit (amino acid) is used. To enhance the coding<br />
efficiency, appropriate number of elements should<br />
be combined together in appropriate number of<br />
positions to cater for n number of states. Two<br />
methods are suggested differing in their output:<br />
In the first method every two bits are<br />
assumed one element. Because 2 bits account for 4<br />
states (i.e. 00, 01, 10, 11) there are 4 different 2 bit<br />
elements in one bite. So 4 4 =256 states. Figure 3<br />
illustrates this coding scheme.<br />
In the second method, similar to the<br />
previous scheme, there are 4 elements in one bite;<br />
the difference, however, is that in the second method<br />
each of 00, 01, 10, 11 are assigned to an alphabetic<br />
letter. Simply stated, the outcome is the<br />
combinations of 4 letters. Again 4 4 =256.(we will refer<br />
to this mechanism throughout the paper as second<br />
method) Figure 4 illustrates this coding scheme.