Abstract
Organisms must maintain proper regulation including defense and healing. Life-threatening problems may be caused by pathogens or by a multicellular organism’s own cells through cancer or autoimmune disorders. Life evolved solutions to these problems that can be conceptualized through the lens of information security, which is a well-developed field in computer science. Here I argue that taking an information security view of cells is not merely semantics, but useful to explain features of signaling, regulation, and defense. An information security perspective also offers a conduit for cross-fertilization of advanced ideas from computer science and the potential for biology to inform computer science. First, I consider whether cells use passwords, i.e., initiation sequences that are required for subsequent signals to have effects, by analyzing the concept of pioneer transcription factors in chromatin regulation and cellular reprogramming. Second, I consider whether cells may encrypt signal transduction cascades. Encryption could benefit cells by making it more difficult for pathogens or oncogenes to hijack cell networks. By using numerous molecules, cells may gain a security advantage in particular against viruses, whose genome sizes are typically under selection pressure. I provide a simple conceptual argument for how cells may perform encryption through posttranslational modifications, complex formation, and chromatin accessibility. I invoke information theory to provide a criterion of an entropy spike to assess whether a signaling cascade has encryption-like features. I discuss how the frequently invoked concept of context dependency may oversimplify more advanced features of cell signaling networks, such as encryption. Therefore, by considering that biochemical networks may be even more complex than commonly realized we may be better able to understand defenses against pathogens and pathologies.
References
Aebersold R et al (2018) How many human proteoforms are there? Nat Chem Biol 14:206–214
Agol VI, Gmyl AP (2010) Viral security proteins: counteracting host defences. Nat Rev Microbiol 8:867–878
Ahsendorf T, Muller FJ, Topkar V, Gunawardena J, Eils R (2017) Transcription factors, coregulators, and epigenetic marks are linearly correlated and highly redundant. PLoS ONE 12:e0186324
Albert R, Jeong H, Barabasi AL (2000) Error and attack tolerance of complex networks. Nature 406:378–382
Alcami A (2003) Viral mimicry of cytokines, chemokines and their receptors. Nat Rev Immunol 3:36–50
Alto NM, Orth K (2012) Subversion of cell signaling by pathogens. Cold Spring Harb Perspect Biol 4:a006114
Ameisen JC (2002) On the origin, evolution, and nature of programmed cell death: a timeline of four billion years. Cell Death Differ 9:367–393
Antebi YE, Nandagopal N, Elowitz MB (2017a) An operational view of intercellular signaling pathways. Curr Opin Syst Biol 1:16–24
Antebi YE et al (2017b) Combinatorial signal perception in the BMP pathway. Cell 170:1184–1196 e24
Azeloglu EU, Iyengar R (2015) Signaling networks: information flow, computation, and decision making. Cold Spring Harb Perspect Biol 7:a005934
Bernstein DJ, Lange T (2017) Post-quantum cryptography. Nature 549:188–194
Bintu L et al (2016) Dynamics of epigenetic regulation at the single-cell level. Science 351:720–724
Broekema MF et al (2018) Profiling of 3696 nuclear receptor–coregulator interactions: a resource for biological and clinical discovery. Endocrinology 159:2397–2407
Brunet TD (2016) Aims and methods of biosteganography. J Biotechnol 226:56–64
Burns J et al (2016) Recurring patterns among scrambled genes in the encrypted genome of the ciliate Oxytricha trifallax. J Theor Biol 410:171–180
Cazzolla Gatti R, Fath B, Hordijk W, Kauffman S, Ulanowicz R (2018) Niche emergence as an autocatalytic process in the evolution of ecosystems. J Theor Biol 454:110–117
Drake JM et al (2016) Phosphoproteome integration reveals patient-specific networks in prostate cancer. Cell 166:1041–1054
Ebhardt HA, Thi EP, Wang MB, Unrau PJ (2005) Extensive 3’ modification of plant small RNAs is modulated by helper component-proteinase expression. Proc Natl Acad Sci USA 102:13398–13403
Feng XH, Derynck R (2005) Specificity and versatility in TGF-beta signaling through Smads. Annu Rev Cell Dev Biol 21:659–693
Gardner M (1972) Codes, ciphers, and secret writing. Dover Publications Inc, New York
Gates AJ, Rocha LM (2016) Control of complex networks requires both structure and dynamics. Sci Rep 6:24456
Graf T, Enver T (2009) Forcing cells to change lineages. Nature 462:587–594
Hanahan D, Weinberg RA (2011) Hallmarks of cancer: the next generation. Cell 144:646–674
Highland HJ (1997) History of computer viruses. Comput Secur 16:416–429
Hood L, Kronenberg M, Hunkapiller T (1985) T cell antigen receptors and the immunoglobulin supergene family. Cell 40:225–229
Kamaraj US, Gough J, Polo JM, Petretto E, Rackham OJ (2016) Computational methods for direct cell conversion. Cell Cycle 15:3343–3354
Knoll AH, Nowak MA (2017) The timetable of evolution. Sci Adv 3:e1603076
Koonin EV, Dolja VV, Krupovic M (2015) Origins and evolution of viruses of eukaryotes: the ultimate modularity. Virology 479–480:2–25
Krakauer DC et al (2011) The challenges and scope of theoretical biology. J Theor Biol 276:269–276
Krakauer DC, Muller L, Prohaska SJ, Stadler PF (2016) Design specifications for cellular regulation. Theory Biosci 135:231–240
Lara E et al (2017) Unveiling the role and life strategies of viruses from the surface to the dark ocean. Sci Adv 3:e1602565
Levy S (2010) Hackers. O’Reilly Media, Sebastopol
Li C, Wang J (2013) Quantifying cell fate decisions for differentiation and reprogramming of a human stem cell network: landscape and biological paths. PLoS Comput Biol 9:e1003165
Li A, Hu Q, Liu J, Pan Y (2016) Resistance and security index of networks: structural information perspective of network security. Sci Rep 6:26810
Liu YY, Slotine JJ, Barabasi AL (2011) Controllability of complex networks. Nature 473:167–173
Lukhovitskaya NI et al (2014) A viral transcription factor exhibits antiviral RNA silencing suppression activity independent of its nuclear localization. J Gen Virol 95:2831–2837
Lustgarten O, Motiei L, Margulies D (2017) User authorization at the molecular scale. ChemPhysChem 18:1678–1687
McKinney C et al (2014) Global reprogramming of the cellular translational landscape facilitates cytomegalovirus replication. Cell Rep 6:9–17
Miller C, Celli J (2016) Avoidance and subversion of eukaryotic homeostatic autophagy mechanisms by bacterial pathogens. J Mol Biol 428:3387–3398
Moffatt JH, Newton P, Newton HJ (2015) Coxiella burnetii: turning hostility into a home. Cell Microbiol 17:621–631
Mousavian Z, Kavousi K, Masoudi-Nejad A (2016a) Information theory in systems biology. Part I: gene regulatory and metabolic networks. Semin Cell Dev Biol 51:3–13
Mousavian Z, Diaz J, Masoudi-Nejad A (2016b) Information theory in systems biology. Part II: protein–protein interaction and signaling networks. Semin Cell Dev Biol 51:14–23
Mukherjee K, Korithoski B, Kolaczkowski B (2014) Ancient origins of vertebrate-specific innate antiviral immunity. Mol Biol Evol 31:140–153
Pinweha P, Rattanapornsompong K, Charoensawan V, Jitrapakdee S (2016) MicroRNAs and oncogenic transcriptional regulatory networks controlling metabolic reprogramming in cancers. Comput Struct Biotechnol J 14:223–233
Sampattavanich S et al (2018) Encoding growth factor identity in the temporal dynamics of FOXO3 under the combinatorial control of ERK and AKT kinases. Cell Syst 6:664–678
Sirisinha S (2014) Evolutionary insights into the origin of innate and adaptive immune systems: different shades of grey. Asian Pac J Allergy Immunol 32:3–15
Spickard EA, Joshi PM, Rothman JH (2018) The multipotency-to-commitment transition in Caenorhabditis elegans-implications for reprogramming from cells to organs. FEBS Lett 592:838–851
Strahl BD, Allis CD (2000) The language of covalent histone modifications. Nature 403:41–45
Stuhlmiller TJ, Earp HS, Johnson GL (2014) Adaptive reprogramming of the breast cancer kinome. Clin Pharmacol Ther 95:413–415
Tipton HF, Krause M (2007) Information security management handbook, vol 3280. CRC Press, Boca Raton
Toker A, Marmiroli S (2014) Signaling specificity in the Akt pathway in biology and disease. Adv Biol Regul 55:28–38
Uda S, Kuroda S (2016) Analysis of cellular signal transduction from an information theoretic approach. Semin Cell Dev Biol 51:24–31
Uhart M, Flores G, Bustos DM (2016) Controllability of protein–protein interaction phosphorylation-based networks: participation of the hub 14-3-3 protein family. Sci Rep 6:26234
van Houte S, Buckling A, Westra ER (2016) Evolutionary ecology of prokaryotic immune mechanisms. Microbiol Mol Biol Rev 80:745–763
Vidal M, Cusick ME, Barabasi AL (2011) Interactome networks and human disease. Cell 144:986–998
Voigt P et al (2012) Asymmetrically modified nucleosomes. Cell 151:181–193
Waltermann C, Klipp E (2011) Information theory based approaches to cellular signaling. Biochim Biophys Acta 1810:924–932
Wang J, Zhang K, Xu L, Wang E (2011) Quantifying the Waddington landscape and biological paths for development and differentiation. Proc Natl Acad Sci USA 108:8257–8262
Wu J, Chen ZJ (2014) Innate immune sensing and signaling of cytosolic nucleic acids. Annu Rev Immunol 32:461–488
Acknowledgements
The author thanks H. Alexander Ebhardt for critical comments and discussion. The author also thanks two anonymous reviewers for critical comments and suggestions, including bringing to his attention the encrypted genomes of Oxytricha and Stylonychia.
Funding
Funding for this study was obtained from the US National Cancer Institute (NCI) P30 Cancer Center Support Grant (CCSG) P30 CA008748 to A.R. The funding covers general support for the research center.
Author information
Authors and Affiliations
Contributions
AR wrote the paper.
Corresponding author
Ethics declarations
Conflict of interest
The author declares that he has no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Root, A. Do cells use passwords in cell-state transitions? Is cell signaling sometimes encrypted?. Theory Biosci. 139, 87–93 (2020). https://doi.org/10.1007/s12064-019-00295-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12064-019-00295-1