- Abstract -
To address the issues of low security and confidentiality in information transmission in today's highly digitalized world, particularly in military operations and commercial conflicts, our team is actively seeking solutions. We propose encoding information using the Wubi input method into DNA sequences, which are then inserted into bacteria such as Escherichia coli for secure and secret information transfer. To ensure the safety of this process, we incorporate conditional growth mechanisms and self-destruction systems to protect the transmitted information.
- Various Methods of Information Transmission -
Throughout history, information transfer has always been a crucial part of human life. Examples of this may include ancient ways of transmitting information like pigeon posts and beacon towers, while modern methods include Morse code, cloud storage, networked drives, and so on.
description1

Historical methods of information transmission have been widely used in daily life and in various fields, particularly in commercial and military contexts. For example, during World War II, codes were often used to convey and transmit information, which not only saved time but also improved communication security. A famous code from World War II, the Navajo Code, consisted of 411 words based on the Navajo language. From 1942 to 1945, the Navajo Code was never deciphered. This code utilized a critical property of the Navajo language—it was unwritten—and used word associations to describe specific phrases and military procedures. Many historians believe that the Navajo code talkers helped the United States win the war more quickly, undoubtedly saving thousands of lives. These translators and their work were classified, with few knowing about it at the time.
Data transmission is ubiquitous in our daily lives, from sending emails to watching TV shows or making phone calls. Efficient information transfer is the core of the effective operation of modern society and other fields. Data security is also a significant issue in our society, as protocols and transmission media may expose people's privacy and information. Due to these uncontrollable factors, the importance of data security is increasing.
description2
Inspired by historical methods of information transmission and in consultation with relevant experts, we have identified three crucial elements of information transfer: a clear encoding and decoding process, a concealed transmission process, and secure transmission means.
description3
- Our Technology  -
We have found that information transmission technology is not only crucial in military contexts, impacting the security of nations and societies, but also affects commercial settings, where critical information in large enterprises can influence a country's economic development. As the world becomes increasingly digital, finding a stable and reliable method of information transmission has become more important than ever.
description7

In response to this challenge, our team believes it is necessary to create a new biological solution that ensures the three key elements of information transmission while, for the first time in history, incorporating Chinese characters and the Wubi input method into the alphabet-based DNA storage method. By using Chinese characters, the stored information can only be read by approximately 16% of the global population, according to statistics from Ethnologue, further ensuring the protection of the information.
Gene sequences can only be replicated under specific conditions by knocking out genes, altering plasmid resistance in bacteria, and adding ndm demethylation operons. In this way, the DNA storage capacity can reach 200 pb/g. Compared to a few grams of USB flash drives, a few grams of DNA can store millions of times more information.
In this context, the transmission of critical short messages (such as wartime intelligence or confidential formulas) requires both stealth and security. While existing encryption methods have proven effective, we offer a reliable biological approach to encrypt and transmit information.
Through Modules 1 and 2, we enhance the stealth of the encryption and decryption processes, while Module 3 improves the security of information transmission by utilizing a self-destruction mechanism. This comprehensive system ensures that the information remains undetectable and protected during transmission.
Our design effectively addresses the issues of stealth and security, with detailed technical explanations provided in the Design section.
Firstly,we encode codons using the traditional Wubi input method and emphasize the randomness of α-helix β-sheets to effectively enhance our cryptography.
description8

The second mechanism involves knocking out information-containing bacteria and establishing a conditional growth mechanism. By gene knockout , the information-containing bacteria can only grow in the presence of methyl xanthine or xanthine, preventing the overgrowth of normal bacteria.
description9

The third mechanism is to implement a self-destruct system, in which the bacteria secrete DNase to degrade their DNA at high temperatures, ensuring information security and preventing unauthorized access. By binding transcription factors to DNA nucleases, the bacteria can avoid self-destruction. However, at temperatures of 37 degrees or higher, the dimer dissociates and leaves the binding site, leading to the DNA being cleaved into fragments. The effectiveness of this mechanism is ensured by selecting genes on each plasmid that express the DpnI nuclease, which has numerous cleavage sites.
description10

These protective mechanisms ensure the secure storage of information and prevent unauthorized access.
- Target Audience -
Our experimental applications are primarily focused on protecting military information and the trade secrets of large enterprises. Given the importance and specificity of these two areas, our project offers the optimal method of information transfer, ensuring security and high confidentiality through biological means. Due to the high costs of DNA sequencing, we choose to focus more on core and impactful information, maximizing the protection of information transmission through our rigorous biological solution. We must spare no effort to protect national-level information and the confidential information of large enterprises to avoid adverse effects on society.
description11