A revolutionary new method of encrypting confidential information has been patented by scientists at Lancaster University.
They have been inspired by their discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other.
A mathematical model based on the complex interaction between these organs has now been transferred to the world of modern communications.
This discovery could transform daily life which is reliant on secure electronic communications for everything from mobiles to sensor networks and the internet.
Every device, from your car key to online bank account, contains different identification codes enabling information to be transferred in confidence. But the race to outwit the hackers means there is a continual demand for better encryption methods.
The discovery is published in the American Physical Society’s journal Physical Review X and a patent application “Encoding Data Using Dynamic System Coupling” has been filed.
Inspiration for the new method of encryption came from interdisciplinary research in the Physics Department by Dr Tomislav Stankovski, Professor Peter McClintock, and Professor Aneta Stefanovska, and the patent includes Dr Robert Young.
Professor McClintock commented that this is a significant discovery.
He said: “This promises an encryption scheme that is so nearly unbreakable that it will be equally unwelcome to internet criminals and official eavesdroppers.”
Professor Stefanovska emphasized the interdisciplinary aspect: “As so often happens with important breakthroughs, this discovery was made right on the boundary between two different subjects – because we were applying physics to biology.”
Dr Stankovski said: “Here we offer a novel encryption scheme derived from biology, radically different from any earlier procedure. Inspired by the time-varying nature of the cardio-respiratory coupling functions recently discovered in humans, we propose a new encryption scheme that is highly resistant to conventional methods of attack.”
The advantage of this discovery is that it offers an infinite number of choices for the secret encryption key shared between the sender and receiver. This makes it virtually impossible for hackers and eavesdroppers to crack the code.
The new method is exceptionally resistant to interference from the random fluctuations or “noise” which affects all communications systems.
It can also transmit several different information streams simultaneously, enabling all the digital devices in the home, for example, to operate on one encryption key instead of dozens of different ones.
The Latest on: Unbreakable security code
via Google News
The Latest on: Unbreakable security code
- Cryptology, cryptography, and cryptanalysison May 8, 2020 at 5:00 pm
But, as early cryptographers have stated, no code is unbreakable. Fourth, the longer your message ... The first technique is character frequency analysis. The National Security Agency (NSA) has run ...
- The Nazis' last transmission: Message from German WWII radio station 'closing down for ever' that was decrypted by Bletchley Park is released by GCHQon May 7, 2020 at 6:29 pm
The last recorded message to be intercepted from a German military communications network at the end of the Second World War has been revealed to the public for the first time. It shows that Britain's ...
- New Labelling Technology Adds a Fourth Dimension to Product Securityon May 5, 2020 at 4:42 pm
A project which has potential to revolutionise labelling technology security has been awarded an ARC Linkage Grant of $445,78 to a team led by ...
- Grappling With India’s Internet Shutdowns From Afaron May 1, 2020 at 9:22 am
India’s comfort with shutting down the internet to quell unrest is at odds with its status as the world’s largest democracy.
- Ransomware Attack on Portuguese Energy Company EDP Shows Increasing Trend Toward Public Leaking of Sensitive Informationon April 29, 2020 at 3:00 pm
Portuguese energy company EDP suffered a ransomware attack by hacking group Ragnarok who threatened to dump 10TB of stolen data if the company does not pay a ransom of $10.9 million.
- Blurry Box, the Unbreakable Software Protection Technologyon April 22, 2020 at 5:00 pm
The contestants tried frantically for three weeks; two of them submitted their results to the independent jury consisting of IT security scientists from the ... software reverse engineering, and code ...
- Couple questions about Assemblyon October 30, 2016 at 3:25 pm
You had to write binary, how possibly did you keep up with 10.000 lines of code consisting only of 1's and 0's? Q2. Wouldn't eliminating security flaws one by one make for safer fundament? I know that ...
- Security will take a quantum leap thanks to ‘atomic fingerprinting'on November 16, 2015 at 9:42 pm
“Only a few months after we made and supplied the devices the team in Lancaster was able to prove the concept that the unique differences in each test device made an unbreakable code that no hacker ..
- Replacing Home Windows With Unbreakable Glasson July 5, 2015 at 6:45 am
"Unbreakable" glass is not really unbreakable ... Homeowners primarily interested in security may prefer to only have the windows replaced in more vulnerable areas, such as the first-floor ...
via Bing News