Fwd: [IP] Re: The emerging science of DNA cryptography

R.A. Hettinga rah at shipwright.com
Fri Mar 20 06:46:40 PDT 2009


Begin forwarded message:

> From: David Farber <dave at farber.net>
> Date: March 20, 2009 9:27:32 AM GMT-04:00
> To: "ip" <ip at v2.listbox.com>
> Subject: [IP] Re:  The emerging science of DNA cryptography
>
>
>
> Begin forwarded message:
>
> From: Ted Nelson <tandm at xanadu.net>
> Date: March 20, 2009 4:52:31 AM EDT
> To: dave at farber.net
> Cc: Ted Nelson <tandm at xanadu.net>
> Subject: Re: [IP] Re: The emerging science of DNA cryptography
> Reply-To: tandm at xanadu.net
>
> Better be well-contained.  There's no knowing
>  what infectious agents might be generated
>  accidentally.  Get a few drops of this in your
>  bloodstream and one of the coded messages
>  might be a new plague, which you pass on to
>  others before it kills you.  (Even if the message
>
>
>
> Ted
>
>
>
> On Thu, Mar 19, 2009 at 8:47 PM, David Farber <dave at farber.net> wrote:
>
>
> Begin forwarded message:
>
> From: dewayne at warpspeed.com (Dewayne Hendricks)
> Date: March 18, 2009 11:19:49 AM EDT
> To: Dewayne-Net Technology List <xyzzy at warpspeed.com>
> Subject: [Dewayne-Net] The emerging science of DNA cryptography
>
> The emerging science of DNA cryptography
> If DNA computing can be used to break codes, then the machinery of  
> life can be exploited to encrypt data too
> Wednesday, March 18, 2009
> <http://www.technologyreview.com/blog/arxiv/23167/>
> Molecular biologists have long thought of DNA as an information  
> storage device. The body processes this information with an  
> impressive array of computing machinery which, since the 1990s,  
> we've exploited to carry out a few of our own calculations.
>
> DNA computing may not be fast but it is massively parallel. With the  
> right kind of setup, it has the potential to solve huge mathematical  
> problems. It's hardly surprising then, that DNA computing represents  
> a serious threat to various powerful encryption schemes such as the  
> Data Encryption Standard (DES).
>
> But if DNA can be used to break codes then it can also be exploited  
> to encrypt data. Various groups have suggested using the sequence of  
> nucleotides in DNA (A for 00, C for 01, G for 10, T for 11) for just  
> this purpose. One idea is to not even bother encrypting the  
> information but simply burying it in the DNA so it is well hidden, a  
> technique called DNA steganography.
>
> [snip]
> RSS Feed: <http://www.warpspeed.com/wordpress>
>
>
>
>
> -------------------------------------------
> Archives: https://www.listbox.com/member/archive/247/=now
> RSS Feed: https://www.listbox.com/member/archive/rss/247/
> Powered by Listbox: http://www.listbox.com
>
>
>
> -- 
> Recent piece on me by N.Y.Times--
> http://www.nytimes.com/2009/01/11/business/11stream.html?_r=1
>
> MY NEW BOOK, 'GEEKS BEARING GIFTS'-- see
> http://stores.lulu.com/store.php?fAcctID=132719
>
> Theodor Holm Nelson
>  Founder, Project Xanadu
>  Visiting Fellow, Oxford Internet Institute
>  Visiting Professor, University of Southampton
>
>
> Archives 	





More information about the cypherpunks-legacy mailing list