A revolutionary new method of encrypting confidential information has been patented by scientists at Lancaster University.
They have been inspired by their discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other.
A mathematical model based on the complex interaction between these organs has now been transferred to the world of modern communications.
This discovery could transform daily life which is reliant on secure electronic communications for everything from mobiles to sensor networks and the internet.
Every device, from your car key to online bank account, contains different identification codes enabling information to be transferred in confidence. But the race to outwit the hackers means there is a continual demand for better encryption methods.
The discovery is published in the American Physical Society’s journal Physical Review X and a patent application “Encoding Data Using Dynamic System Coupling” has been filed.
Inspiration for the new method of encryption came from interdisciplinary research in the Physics Department by Dr Tomislav Stankovski, Professor Peter McClintock, and Professor Aneta Stefanovska, and the patent includes Dr Robert Young.
Professor McClintock commented that this is a significant discovery.
He said: “This promises an encryption scheme that is so nearly unbreakable that it will be equally unwelcome to internet criminals and official eavesdroppers.”
Professor Stefanovska emphasized the interdisciplinary aspect: “As so often happens with important breakthroughs, this discovery was made right on the boundary between two different subjects – because we were applying physics to biology.”
Dr Stankovski said: “Here we offer a novel encryption scheme derived from biology, radically different from any earlier procedure. Inspired by the time-varying nature of the cardio-respiratory coupling functions recently discovered in humans, we propose a new encryption scheme that is highly resistant to conventional methods of attack.”
The advantage of this discovery is that it offers an infinite number of choices for the secret encryption key shared between the sender and receiver. This makes it virtually impossible for hackers and eavesdroppers to crack the code.
The new method is exceptionally resistant to interference from the random fluctuations or “noise” which affects all communications systems.
It can also transmit several different information streams simultaneously, enabling all the digital devices in the home, for example, to operate on one encryption key instead of dozens of different ones.
The Latest on: Unbreakable security code
via Google News
The Latest on: Unbreakable security code
- China paying 'close attention' to situation in Kashmir: Xi Jinping tells Imran Khanon October 9, 2019 at 8:51 pm
Xi, who is scheduled to visit India on Friday to hold 2nd informal summit with Prime Minister Narendra Modi, assured Khan during a meeting here that the friendship between China and Pakistan is ...
- Pakistan-China friendship unbreakable, rock-solid: Xi Jinpingon October 9, 2019 at 3:28 am
President Xi Jinping on October 9 assured Prime Minister Imran Khan that the friendship between China and Pakistan is "unbreakable and rock-solid ... omitting its recent references to the UN and UN ...
- How Long Will Unbreakable Commercial Encryption Last?on September 20, 2019 at 6:15 am
Equally importantly, unbreakable user security will increasingly conflict with the commercial ... when the member states implement the 2018 European Electronic Communications Code, which unifies ...
- The Soviets’ Unbreakable Codeon April 26, 2019 at 5:00 pm
And not only would any new communications system have to be unbreakable ... who examined the U.S. National Security Agency’s efforts to crack Soviet ciphers in his book Code Warriors, that it could be ...
- Build unbreakable appson February 28, 2019 at 9:17 pm
80% of applications contain at least one critical or high vulnerability while 90% of security incidents are from exploiting defects in the design or code of software. Not only do applications provide ...
- NanoLock’s Lightweight, Unbreakable Security and Management Platform Sets New Standard for IoT Security Solutionson June 20, 2018 at 7:35 am
The company provides the industry’s only lightweight, unbreakable, low-cost security and management solution for connected ... preventing attacks ranging from ransomware to malicious manipulation of ...
- Leti writes ‘unbreakable’ security code on to the chipon March 8, 2018 at 4:38 am
Leti, the French microelectronics research centre, says it has developed a way to encrypt individual chips with a security code. Working with lithography equipment supplier Mapper Lithography, Leti ...
- How a 100-Year-Old Unbreakable Cipher Will Transform Digital Securityon February 14, 2018 at 1:04 pm
is the art of writing or solving codes. In the security world, it’s the practice and study of techniques for secure communication in the presence of third parties called adversaries. I call it sharing ...
- China sends 'unbreakable code' from quantum satellite to Earthon August 11, 2017 at 1:26 am
A new satellite has been able to transmit 'unbreakable' code in an effort to build 'hack-proof' communications ... Strengthen your organization's IT security defenses by keeping abreast of the latest ...
- Chinese quantum satellite sends 'unbreakable' codeon August 10, 2017 at 4:15 pm
BEIJING (Reuters) - China has sent an “unbreakable” code from a satellite to the Earth ... Xi Jinping has prioritized advancing its space program, citing national security and defense. China insists ...
via Bing News