Encryption and decryption method based on gene chip

ABSTRACT

A method for asymmetric encryption based on a gene chip includes the steps of (a) obtaining original information in text or image or other form and converting the same into a binary code, and (b) preprocessing the binary code to obtain a binary matrix. In (c), an encryption key is obtained, the encryption key comprising a gene expression solution. In (d), the gene expression solution is placed on a gene chip according to an arrangement and correspondence of the binary matrix.

FIELD

The subject matter herein generally relates to data security byencryption.

BACKGROUND

Deoxyribonucleic acid (DNA) encryption technology may provide reliabledata security. Currently, a DNA-based symmetrical encryption method haslow security rating and an end of a binary matrix directly converted byplaintext is completely filled with zeros. DNA-based symmetricalencryption ignores a potential danger of an end filling of a virtualchip. Moreover, the gene encryption methods generally select a syntheticnucleotide sequence to express a protein, which is difficult tomanufacture and is very expensive.

Therefore, there is room for improvement within the art.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the disclosure can be better understood with referenceto the following figures. The components in the figures are notnecessarily drawn to scale, the emphasis instead being placed uponclearly illustrating the principles of the disclosure. Moreover, in thedrawings, like reference numerals designate corresponding partsthroughout several views.

FIG. 1 is a flowchart of a method of asymmetric encryption based on agene chip according to an embodiment of the present disclosure.

FIG. 2 is a flowchart of a method of asymmetric decryption based on agene chip according to an embodiment of the present disclosure.

FIG. 3 is a schematic diagram showing a decryption key chip decrypting agene chip according to an embodiment of the present disclosure.

DETAILED DESCRIPTION

It will be appreciated that for simplicity and clarity of illustration,where appropriate, reference numerals have been repeated among thedifferent figures to indicate corresponding or analogous elements. Inaddition, numerous specific details are set forth in order to provide athorough understanding of the embodiments described herein. However, itwill be understood by those of ordinary skill in the art that theembodiments described herein can be practiced without these specificdetails. In other instances, methods, procedures and components have notbeen described in detail so as not to obscure the related relevantfeature being described. Also, the description is not to be consideredas limiting the scope of the embodiments described herein. The drawingsare not necessarily to scale and the proportions of certain parts may beexaggerated to better illustrate details and features of the presentdisclosure.

The term “coupled” is defined as connected, whether directly orindirectly through intervening components, and is not necessarilylimited to physical connections. The connection can be such that theobjects are permanently connected or releasably connected. The term“comprising,” when utilized, means “including, but not necessarilylimited to”; it specifically indicates open-ended inclusion ormembership in the so-described combination, group, series, and the like.

FIG. 1 illustrates a flowchart of a method of asymmetric encryptionbased on a gene chip. The method is provided by way of example, as thereare a variety of ways to carry out the method. Each block shown in FIG.1 represents one or more processes, methods, or subroutines which arecarried out in the example method. Furthermore, the order of blocks isillustrative only and additional blocks can be added or fewer blocks maybe utilized without departing from the scope of this disclosure.

At block S11, original information or data is obtained and is convertedinto a binary code.

In one embodiment, the original information may be text-based. Thetextual information is converted into a binary code according to anAmerican Standard Code for Information Interchange (ASCII) encodingrule. For example, when original text “Hello” is obtained, the same canbe converted into a binary code“0100100001100101011011000110110001101111” according to the ASCIIencoding rule.

In other embodiments, the original information may also be image-based.The image can also be converted into a binary code through sampling,quantization, and encoding.

At block S12, the binary code is preprocessed to obtain a binary matrix.

In one embodiment, the binary matrix is a matrix of seven rows and sixcolumns (7*6). That is, a binary number of the binary matrix is 42.

In one embodiment, the method for preprocessing the binary code toobtain the binary matrix at least includes the following sub-blocksS121, S122, and S123.

At sub-block S121, when a bit number of the binary code is less than thenumber of elements of the binary matrix, zero (“0”) is added to an endof the binary code until the bit number of the binary code is equal tothe number of elements of the binary matrix.

At sub-block S122, the processed binary code is converted to atransitional binary matrix.

In sub-block S122, the transitional binary matrix is also a matrix ofseven rows and six columns (7*6). That is, a binary number of thetransitional binary matrix is 42.

At sub-block S123, the transitional binary matrix is scrambled to obtainthe binary matrix.

In one embodiment, the transitional binary matrix is scrambled accordingto an Inexact Augmented Lagrange Multiplier (IALM) algorithm.

In other embodiments, the transitional binary matrix can be scrambledaccording to other algorithms.

For example, the original information in text form is “Hello”. The“Hello” can be converted into a binary code“0100100001100101011011000110110001101111” according to the ASCIIencoding rule. Since a bit number of the binary code“0100100001100101011011000110110001101111” is less than the number ofelements of the binary matrix, zeros are added to an end of the binarycode “0100100001100101011011000110110001101111” until the bit number ofthe binary code is equal to the number of elements of the binary matrix.In this case, two zeros are added to the binary code to obtain“010010000110010101101100011011000110111100”. The binary code with addedzeros is converted to a transitional binary matrix (1) as follow:

$\begin{pmatrix}0 & 1 & 0 & 0 & 1 & 0 \\0 & 0 & 0 & 1 & 1 & 0 \\0 & 1 & 0 & 1 & 0 & 1 \\0 & 0 & 1 & 1 & 0 & 0 \\0 & 1 & 1 & 0 & 1 & 1 \\0 & 0 & 0 & 1 & 1 & 0 \\1 & 1 & 1 & 1 & 0 & 0\end{pmatrix}$ transitional  binary  matrix  (1)

Finally, the above transitional binary matrix (1) is scrambled to obtaina binary matrix (2) as follow.

$\begin{pmatrix}1 & 1 & 0 & 1 & 1 & 0 \\0 & 1 & 0 & 0 & 0 & 1 \\1 & 0 & 1 & 1 & 0 & 0 \\0 & 0 & 1 & 0 & 1 & 1 \\1 & 0 & 1 & 0 & 1 & 1 \\0 & 0 & 0 & 1 & 0 & 1 \\0 & 1 & 1 & 0 & 0 & 1\end{pmatrix}$ binary  matrix  (2)

At block S13, an encryption key is obtained. The encryption key includesa gene expression solution.

In one embodiment, the encryption key can be obtained through an invitro expression experiment of a selenoprotein gene.

In detail, the method for obtaining the encryption key through suchexperiment can include obtaining two groups of gene expression solutionsthrough such experiments. The first group of gene expression solutionsincludes a nucleotide sequence which can express selenoprotein. Thenucleotide sequence of the second group of gene expression solutionscannot express selenoprotein.

In one embodiment, the encryption key can include a nucleotide sequencewhich can express selenoprotein and a nucleotide sequence which cannotexpress selenoprotein.

In other embodiments, the encryption key can include only the nucleotidesequence which can express selenoprotein.

In one embodiment, the nucleotide sequence in the gene expressionsolution can be obtained through cleavage or polymerase chain reactionto amplify a natural nucleotide sequence of selenoprotein.

In one embodiment, the selenoprotein may be a protein includingselenocysteine, for example, a thioredoxin reductase of a mammaliansystem. The thioredoxin reductase provides two groups of gene expressionsolutions through in vitro expression experiments. The first group ofsolutions includes a nucleotide sequence which can express thioredoxinreductase. The nucleotide sequence of the second group of solutionscannot express the thioredoxin reductase.

In other embodiments, the selenoprotein may be thioredoxin reductase.The thioredoxin reductase obtains a group of gene expression solutionthrough in vitro expression experiments. The solution only includesnucleotide sequence which can express thioredoxin reductase. Then theencryption key is obtained through the solution which includes theexpressing nucleotide sequence.

At block S14, the gene expression solution is placed on a gene chipaccording to an arrangement of the binary matrix.

In one embodiment, the method for placing the gene expression solutionon the gene chip may be selecting a gene expression solutioncorresponding to information of elements in the binary matrix, andplacing the gene expression solution on a corresponding position of thegene chip.

For example, in one embodiment, a nucleotide sequence havingselenoprotein can be placed at a first position corresponding to thebinary number “1” of the binary matrix (2). A nucleotide sequencewithout selenoprotein can be placed at a second position correspondingto the binary number “0” of the binary matrix (2). Thereby, a gene chipusing nucleotide sequence to express information is obtained.

FIG. 2 illustrates a flowchart of a method of asymmetric decryptionbased on a gene chip. The method is provided by way of example, as thereare a variety of ways to carry out the method. Each block shown in FIG.2 represents one or more processes, methods, or subroutines which arecarried out in the example method. Furthermore, the order of blocks isillustrative only and additional blocks can be added or fewer blocks maybe utilized without departing from the scope of this disclosure.

At block S21, a decryption key is obtained through detection of a geneexpression.

In one embodiment, the method for obtaining the decryption key throughsuch detection is to obtain a decrypted nucleotide sequence in a mixedsolution of DNA biochemical reagent through a predetermined experiment.The decrypted nucleotide sequence is then the decryption key.

In one embodiment, the DNA biochemical reagent may be an essentialcomponent of an organism. The main component of the DNA biochemicalreagent is an amino acid.

In one embodiment, the predetermined experiment is an electrophoresisexperiment. Then, the decrypted nucleotide sequence, that is, thedecryption key, can be obtained through a hybridization reaction underthe electrophoresis experiment.

At block S22, a gene chip awaiting decryption is obtained and the genechip is decrypted through the decryption key to obtain a decryptedbinary matrix.

In one embodiment, the method for decrypting the gene chip may beperformed through an in vitro expression experiment of a decryptinggene.

In one embodiment, the method for obtaining the gene chip and performingthe in vitro expression experiment of the decrypting gene on the genechip and the decryption key to obtain decryption of a binary matrix mayinclude sub-blocks S221, S222, and S223.

At sub-block S221, a decryption key chip is made using the decryptionkey. A number and position of the nucleotide sequences on the decryptionkey chip is consistent with the position and number of the geneexpression solution arranged on the gene chip.

At sub-block S222, the gene chip is combined with the decryption keychip, and the nucleotide sequence of the selenoprotein on the gene chipis recorded through the nucleotide sequence of the decryption key.

In detail, when selenoprotein is detected in a predetermined region onthe gene chip, the predetermined region is recorded as “1”. When thepredetermined region on the gene chip does not include selenoprotein,the predetermined region is recorded as “0”.

At sub-block S223, according to such recording, the selenoproteininformation on the gene chip is summarized to obtain the decryptedbinary matrix.

In one embodiment, a surface of the gene chip is divided into 42regions. Each region includes information encrypted by a nucleotidesequence of a gene expression solution. A surface of the decryption keychip is also divided into 42 regions. A method of dividing the regionsof the decryption key chip is the same as the method applied to the genechip. Each region of the decryption key chip includes a decryptednucleotide sequence.

As shown in FIG. 3, the gene chip is combined with the decryption keychip, so that each position on the decryption key chip coincides andcorresponds with the position on the gene chip. Through anelectrophoretic analysis method, the nucleotide sequence on the genechip is recorded by the nucleotide sequence on the decryption key. Bysuch recording, when a nucleotide sequence which can expressselenoprotein is detected on the predetermined region on the gene chip,the predetermined region is recorded as “1”. When the predeterminedregion is found to not include a nucleotide sequence which can expressselenoprotein, the predetermined region is recorded as “0”. According tosuch recording, the nucleotide sequence information on the gene chip issummarized to obtain the decrypted binary matrix.

At block S23, the decrypted binary matrix is inversely processed toobtain a decrypted binary code.

The method for inversely processing the decrypted binary matrix toobtain the decrypted binary code may include sub-blocks S231, S232, andS233.

At sub-block S231, the decrypted binary matrix is processed to obtain aninverse scrambled matrix.

In one embodiment, the decrypted binary matrix is processed according toan inverse algorithm of the IALM algorithm.

At sub-block S232, the redundant information added at the end of theinverse scrambled matrix is eliminated.

At sub-block S233, the inverse scrambled matrix without the redundantinformation is converted into a binary code.

In one embodiment, in order to construct a binary matrix in theencryption process, zero is added to an end of the binary code. Thus,after the decryption is completed, the added zero at the end of theinverse scrambled matrix needs to be eliminated. The inverse scrambledmatrix without redundant information (the redundant information is “0”at the end of the binary matrix in this embodiment) is then convertedinto the binary code.

At block S24, the binary code is converted into the original informationor data.

In one embodiment, when the obtained binary code information is“0100100001100101011011000110110001101111”, the binary code will beconverted back into the text “Hello” according to the ASCII coded rule.

It is believed that the embodiments and their advantages will beunderstood from the foregoing description, and it will be apparent thatvarious changes may be made thereto without departing from the scope ofthe disclosure or sacrificing all of its advantages, the exampleshereinbefore described merely being illustrative embodiments of thedisclosure.

What is claimed is:
 1. A method of asymmetric encryption based on a genechip, the method comprising: (a) obtaining original information andconverting the original information into a binary code; (b)preprocessing the binary code to obtain a binary matrix; (c) obtainingan encryption key, the encryption key comprising a gene expressionsolution; and (d) placing the gene expression solution on a gene chipaccording to an arrangement of the binary matrix.
 2. The method of claim1, wherein step (b) comprises: adding zeros to an end of the binary codeuntil a bit number of the binary code being equal to a number ofelements of the binary matrix; and converting the binary code with addedzeros to the binary matrix.
 3. The method of claim 2, wherein step (b)further comprises: scrambling the elements of the binary matrixaccording to a predetermined algorithm.
 4. The method of claim 1,wherein in step (d), the encryption key is obtained through an in vitroexpression experiment of a selenoprotein gene.
 5. The method of claim 4,wherein the step for obtaining the encryption key through the in vitroexpression experiment of the selenoprotein gene comprises: obtaining afirst group of gene expression solutions and a second group of geneexpression solutions through the in vitro expression experiments of theselenoprotein gene; wherein the first group of gene expression solutionscomprises a nucleotide sequence which can express selenoprotein, thesecond group of gene expression solutions comprises a nucleotidesequence which cannot express selenoprotein.
 6. The method of claim 5,wherein the encryption key is at least one of the first group of geneexpression solutions and the second group of gene expression solutions.7. The method of claim 5, wherein the nucleotide sequence in the firstand the second gene expression solutions is obtained through cleavageand polymerase chain reaction to amplify a nucleotide sequence ofselenoprotein in nature.
 8. The method of claim 1, wherein step (d)further comprises: selecting a gene expression solution corresponding toinformation of elements in the binary matrix; and placing the geneexpression solution on a corresponding position of the gene chip.
 9. Amethod of asymmetric decryption based on a gene chip, the methodcomprising: (a) obtaining a decryption key through detection of a geneexpression; (b) obtaining a gene chip awaiting decryption; (c)decrypting the gene chip through the decryption key to obtain adecrypted binary matrix; (d) inversely processing the decrypted binarymatrix to obtain a decrypted binary code; and (e) converting the binarycode into original information.
 10. The method of claim 9, wherein instep (c), the gene chip is decrypted through an in vitro expressionexperiment of a decrypting gene.
 11. The method of claim 10, whereinstep (a) further comprises: obtaining a decrypted nucleotide sequence ina mixed solution of DNA biochemical reagent through a predeterminedexperiment; wherein the decrypted nucleotide sequence is the decryptionkey.
 12. The method of claim 9, wherein step (c) comprises: making adecryption key chip using the decryption key, wherein a number and aposition of the nucleotide sequences on the decryption key chip isconsistent with a position and a number of the gene expression solutionarranged on the gene chip; combining the gene chip with the decryptionkey chip, and recording the nucleotide sequence of the selenoprotein onthe gene chip through the nucleotide sequence of the decryption key;summarizing the selenoprotein information on the gene chip according tothe recording to obtain the decrypted binary matrix.
 13. The method ofclaim 12, wherein when a predetermined region on the gene chip isdetected to include selenoprotein, the predetermined region is recordedas “1”, and when the predetermined region on the gene chip does notinclude selenoprotein, the predetermined region is recorded as “0”. 14.The method of claim 9, wherein step (d) comprises: processing thedecrypted binary matrix to obtain an inverse scrambled matrix;eliminating redundant information added at the end of the inversescrambled matrix; and converting the inverse scrambled matrix withoutthe redundant information into the binary code.
 15. The method of claim14, wherein the decrypted binary matrix is processed according to aninverse algorithm of an Inexact Augmented Lagrange Multiplier (IALM)algorithm.