A revolutionary new method of encrypting confidential information has been patented by scientists at Lancaster University.
They have been inspired by their discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other.
A mathematical model based on the complex interaction between these organs has now been transferred to the world of modern communications.
This discovery could transform daily life which is reliant on secure electronic communications for everything from mobiles to sensor networks and the internet.
Every device, from your car key to online bank account, contains different identification codes enabling information to be transferred in confidence. But the race to outwit the hackers means there is a continual demand for better encryption methods.
The discovery is published in the American Physical Society’s journal Physical Review X and a patent application “Encoding Data Using Dynamic System Coupling” has been filed.
Inspiration for the new method of encryption came from interdisciplinary research in the Physics Department by Dr Tomislav Stankovski, Professor Peter McClintock, and Professor Aneta Stefanovska, and the patent includes Dr Robert Young.
Professor McClintock commented that this is a significant discovery.
He said: “This promises an encryption scheme that is so nearly unbreakable that it will be equally unwelcome to internet criminals and official eavesdroppers.”
Professor Stefanovska emphasized the interdisciplinary aspect: “As so often happens with important breakthroughs, this discovery was made right on the boundary between two different subjects – because we were applying physics to biology.”
Dr Stankovski said: “Here we offer a novel encryption scheme derived from biology, radically different from any earlier procedure. Inspired by the time-varying nature of the cardio-respiratory coupling functions recently discovered in humans, we propose a new encryption scheme that is highly resistant to conventional methods of attack.”
The advantage of this discovery is that it offers an infinite number of choices for the secret encryption key shared between the sender and receiver. This makes it virtually impossible for hackers and eavesdroppers to crack the code.
The new method is exceptionally resistant to interference from the random fluctuations or “noise” which affects all communications systems.
It can also transmit several different information streams simultaneously, enabling all the digital devices in the home, for example, to operate on one encryption key instead of dozens of different ones.
The Latest on: Unbreakable security code
via Google News
The Latest on: Unbreakable security code
- Use Google? 5 new ways to secure your accounton November 26, 2020 at 2:16 am
Google accounts handle everything from your contacts, calendar, documents, files, photos and more. Kim Komando offers 5 tips to keep them secure.
- Unbreakable at 20: the film that finally took superheroes seriouslyon November 23, 2020 at 7:38 am
If they gave awards for the dumbest expository title cards to open or conclude motion pictures – a lively ceremony, to be sure – 2000’s undisputed winner would have been Unbreakable.
- Use Google? 5 new ways to secure your accounton November 20, 2020 at 4:00 pm
Google’s Security ... about creating unbreakable passwords. Be sure to set up two-factor authentication (2FA), too. This way, you get a text message sent to your phone with a code when you ...
- Here are 5 ways to secure your Google accounton November 19, 2020 at 6:02 pm
Get a free security ... about creating unbreakable passwords. Be sure to set up two-factor authentication (2FA), too. This way, you get a text message sent to your phone with a code when you ...
- Blurry Box, the Unbreakable Software Protection Technologyon November 13, 2020 at 4:01 pm
The contestants tried frantically for three weeks; two of them submitted their results to the independent jury consisting of IT security scientists from the ... software reverse engineering, and code ...
- Did Mail-in Ballots Secretly Contain Quantum Blockchain Watermarks?on November 13, 2020 at 4:06 am
“Official ballots had been printed with an invisible, unbreakable code watermark ... most mail-in ballots have watermarks, QR codes, or other security devices included. Like the patent ...
- No, Judicial Watch didn’t publish a bogus story about the National Guard recounting voteson November 11, 2020 at 12:57 pm
morning 8 Nov. To prevent fraud official ballots had been printed with an invisible, unbreakable code watermark and registered ... of the Department of Homeland Security, secretly watermarked ...
- How China Is Using Quantum Physics to Take Over the World and Stop Hackerson October 31, 2020 at 5:00 pm
The quantum codes simultaneously generated in the base stations ... “This doesn't mean we [will be] perfectly safe online, or entering an era of unbreakable online security”—but great areas of ...
- Chrome hacked in five minuteson October 27, 2020 at 5:01 pm
“We pwned Chrome to make things clear to everyone,” said Chaouki Bekrar, CEO of Vupen Security, according to Ars Technica. “We wanted to show that even Chrome is not unbreakable.” The firm ...
- Apple says iOS 8 and up designed to be unhackable by even Apple itselfon October 18, 2020 at 6:16 pm
Never has the privacy and security of customer data been as important ... CEO Tim Cook recently demanding the White House support unbreakable encryption, the company sure is buying a lot of ...
via Bing News