In the digital age, security of sensitive information is of utmost importance. Many data are encrypted before they enter the data highway. Mostly, these methods use a password for decryption, and in most cases, exactly this password is the entrance gate for hackers. Scientists of Karlsruhe Institute of Technology (KIT) use a new and highly secure approach by combining computer science with chemistry and a conventional encryption method with a chemical password.
Their development is now reported in an open access publication in Nature Communications. (DOI: 10.1038/s41467-018-03784-x ).
Today, very good and highly effective encryption programs exist, which are difficult to overcome, provided that the computer capacity is limited. The password, however, always remains the weak point. If it is badly chosen and does not meet the necessary security requirements, it is the Achilles heel of entire encryption. Exactly here is the starting point of work of the scientists of KIT: They conceal the information of the password in a small organic molecule. And while the encrypted digital information can travel publicly, the key to read the information is transported invisibly and without the knowledge of the environment in a form of a small volume of a chemical compound, e.g. as a droplet on paper.
Computer science meets chemistry: Encryption and decryption in detail. (Graphics: Andreas Boukis, KIT)
“Of course, this method is only suited for applications requiring high security levels and, hence, justifying a high expenditure, examples being the transmission of intelligence or communication of embassies,” says Professor Michael Meier of KIT’s Institute of Organic Chemistry. Other applications might be identification or anti counterfeit tags. We can work with smallest amounts and also find them in materials, in which other chemical compounds, such as DNA molecules, cannot be used,” first author Andreas Boukis adds. The scientists succeeded in reliably isolating chemical keys from various carrier materials, such as paper, perfume, instant coffee, green tea, sugar, and even pork blood.
Application of the password in the form of a molecule, sending the message, extracting the molecule, and decryption: The simplified representation above illustrates a highly complex and highly secure method. (Photos: Amadeus Bramsiepe, KIT; graphics: Leon Kühner, KIT)
The information of the chemical key is hidden in the sequence of building blocks and the attached sidechains. Each of these chemical components is assigned a letter and a number. Depending on which components are synthesized in which sequence and with which sidechains, an individual alphanumerical code results for the password molecule. It is read out with a specially developed computer program and converted into a binary code. For synthesis, the scientists used a conventional so-called multi-component reaction. It allows to synthesize a previously defined molecule in one step with a small expenditure. As basic components, the researchers selected suitable commercially available compounds. With this database of 130 different basic compounds, 500,000 chemical keys can be synthesized, containing a basic information of 18 bits each. By combining various chemical keys that can also be transmitted at various times and places, information storage capacity and, hence, security can be further increased. As the compounds are highly robust, they are suited for a variety of carrier materials. Thanks to another property, they are also easy to find: At a certain position, they have a special sidechain that facilitates recovery, so-called perfluoroalkyls. Their properties are similar to those of teflon, i.e. they do not like to interact with aqueous (polar) or fatty (unpolar) media, but only with other perfluorinated compounds. For this rea [Textfeld: Computer science meets chemistry: Encryption and decryption in detail. (Graphics: Andreas Boukis, KIT)] son, these molecules can be separated selectively from a mixture. The isolated compounds are then analyzed using a conventional highly sensitive analysis method, mass spectrometry. The mass of entire molecules, but also of defined fragments is determined. If the library of the 130 possible initial components is known, conclusions can be drawn with respect to the molecule and the password for decryption can be read out.
“The idea to send information via secret channels is not new. But our process is characterized by the fact that we provide a highly robust secret channel that needs minimum amounts of the key molecule only,” Professor Dennis Hofheinz of the Institute of Theoretical Informatics summarizes the advantages of chemical passwords.
The Latest on: Encryption
via Google News
The Latest on: Encryption
- Network Encryption System Market Rising Demand, Growth, Trend & Insights for Next 5 Years: Key Players: Cisco, Atos, Huawei on February 19, 2019 at 10:12 pm
Edison, NJ -- (SBWIRE) -- 02/19/2019 -- HTF MI published a new industry research that focuses on Network Encryption System market and delivers in-depth market analysis and future prospects of Global N... […]
- Cloud Encryption Market 2019-2023: Regional Analysis of Key Players, Potential Growth, Share, Demand and Forecast on February 19, 2019 at 9:53 pm
Pune, India -- (SBWIRE) -- 02/19/2019 -- The Cloud Encryption Market Report Provides in-depth And statistical Analysis of Cloud Encryption Market on the basis of Market drivers, Market limitations, an... […]
- Hear Directly From Leading Technology Companies on Latest Global Development in Encryption and Cloud Computing on February 19, 2019 at 2:43 pm
SAN FRANCISCO, Feb. 19, 2019 /PRNewswire/ -- American Conference Institute will host a 2-day comprehensive conference on the most pressing issues affecting Global Encryption, Cloud & Cyber Trade Contr... […]
- Bluefin's Patented P2PE Manager® Earns PCI P2PE Component Certification for Encryption Management Services on February 19, 2019 at 8:48 am
ATLANTA, Feb. 19, 2019 /PRNewswire-PRWeb/ -- Bluefin, the leading provider of payment security technologies and PCI-validated Point-to-Point Encryption (P2PE) solutions for retail, transportation, hos... […]
- Mobile Encryption Market Size Analysis by Growth and Forecast to 2024 on February 19, 2019 at 6:35 am
Feb 19, 2019 (Heraldkeeper via COMTEX) -- Global Mobile Encryption Market Report-2023 Report offers market overview, segmentation by types, application, countries, key manufactures, cost analysis, ind... […]
- Lessons from the Encryption Front Line: Core Components in the Cloud on February 19, 2019 at 4:48 am
This is the second installment in a multipart series about data encryption. Be sure to read part one for the full story. Now that we understand the common threats facing organizations and how to ... […]
- The Best Data Encryption Tools (And How To Use Them) on February 19, 2019 at 4:30 am
There was a time when encryption was only important for governments and big business. But as more and more of our data has shifted from physical to digital, the need to protect everything we create, s... […]
- WhatsApp is at risk in India. So are free speech and encryption. on February 19, 2019 at 3:00 am
India is WhatsApp’s biggest market. It’s also suddenly one of the company’s biggest threats. Regulators in India, where both WhatsApp and parent company Facebook have more than 200 million users, are ... […]
- What Is the Difference Between PCI-Certified and Non-Certified Encryption? on February 18, 2019 at 7:04 am
I get that question a lot. For purposes of my definition, folks might hear “PCI-certified,” they might “PCI-approved,” and they might hear “PCI-validated” point-to-point encryption. These terms all re... […]
via Bing News