A revolutionary new method of encrypting confidential information has been patented by scientists at Lancaster University.
They have been inspired by their discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other.
A mathematical model based on the complex interaction between these organs has now been transferred to the world of modern communications.
This discovery could transform daily life which is reliant on secure electronic communications for everything from mobiles to sensor networks and the internet.
Every device, from your car key to online bank account, contains different identification codes enabling information to be transferred in confidence. But the race to outwit the hackers means there is a continual demand for better encryption methods.
The discovery is published in the American Physical Society’s journal Physical Review X and a patent application “Encoding Data Using Dynamic System Coupling” has been filed.
Inspiration for the new method of encryption came from interdisciplinary research in the Physics Department by Dr Tomislav Stankovski, Professor Peter McClintock, and Professor Aneta Stefanovska, and the patent includes Dr Robert Young.
Professor McClintock commented that this is a significant discovery.
He said: “This promises an encryption scheme that is so nearly unbreakable that it will be equally unwelcome to internet criminals and official eavesdroppers.”
Professor Stefanovska emphasized the interdisciplinary aspect: “As so often happens with important breakthroughs, this discovery was made right on the boundary between two different subjects – because we were applying physics to biology.”
Dr Stankovski said: “Here we offer a novel encryption scheme derived from biology, radically different from any earlier procedure. Inspired by the time-varying nature of the cardio-respiratory coupling functions recently discovered in humans, we propose a new encryption scheme that is highly resistant to conventional methods of attack.”
The advantage of this discovery is that it offers an infinite number of choices for the secret encryption key shared between the sender and receiver. This makes it virtually impossible for hackers and eavesdroppers to crack the code.
The new method is exceptionally resistant to interference from the random fluctuations or “noise” which affects all communications systems.
It can also transmit several different information streams simultaneously, enabling all the digital devices in the home, for example, to operate on one encryption key instead of dozens of different ones.
The Latest on: Unbreakable security code
via Google News
The Latest on: Unbreakable security code
- Cryptology, cryptography, and cryptanalysison January 28, 2020 at 4:00 pm
But, as early cryptographers have stated, no code is unbreakable. Fourth, the longer your message ... The first technique is character frequency analysis. The National Security Agency (NSA) has run ...
- ‘I Am More Marlian Than I Thought’ – Singer Peruzzion January 25, 2020 at 8:51 am
Tanko Yakasai, has advised the federal government against accepting the Western Nigeria Security Network code-named: Amotekun ... READ ALSO – Peruzzi Says His Relationship With Davido Is ‘Unbreakable’ ...
- The best password managerson January 24, 2020 at 9:22 am
With proper implementation and a strong encryption key (your master password), AES is considered unbreakable. PBKDF2 SHA-256 is used ... of open source code is that people can and do examine the code, ...
- Upgrade Solidity Smart Contracton January 20, 2020 at 1:00 pm
Once if the smart contract is coded by solidity it is safe and secure as well as it is unbreakable one ... the size of the transaction but the security and safety is given by usage of high ...
- Japan test makes leap in quantum cryptography developmenton January 14, 2020 at 2:02 am
it could break the current code used by slower systems in internet security and produce new unbreakable code. Quantum cryptography can also detect all illegal interception of data and remake ...
- How Does Relictum Pro Biometric Facial Recognition System Work?on November 28, 2019 at 4:00 pm
All these features were expected to make the system unbreakable or unhackable ... for the hackers who were quickly able to crack the code and transfer money without leaving a trace.
- China sends “unbreakable” quantum code from satelliteon August 10, 2017 at 12:43 am
China has transmitted an encrypted signal from a satellite using quantum key distribution technology, Reuters reported. It launched the first quantum satellite in August 2016, with the latest ...
- Chinese quantum satellite sends 'unbreakable' codeon August 9, 2017 at 5:00 pm
BEIJING (Reuters) - China has sent an “unbreakable” code from a satellite to the Earth ... citing national security and defense. China insists its space program is for peaceful purposes ...
- Bletchley Park: Teen cyberdefence school planned at historic home of codebreakingon November 24, 2016 at 4:04 am
when the UK's first National College for Cyber Security opens its doors on the iconic site. Hitler's "unbreakable" encryption machine - and the Bletchley Park devices which cracked the code The ...
- Smartphone encryption ban? It's a boon for criminals and terroristson January 15, 2016 at 9:20 am
When it comes to unbreakable codes, using the full resources of our national security team, we're pretty good at breaking them. So if we allow everyone to have good and strong encryption ...
via Bing News