Data breaches, hacked systems and hostage malware are frequently topics of evening news casts — including stories of department store, hospital, government and bank data leaking into unsavory hands — but now a team of engineers has an encryption key approach that is unclonable and not reverse-engineerable, protecting information even as computers become faster and nimbler.
“Currently, encryption is done with mathematical algorithms that are called one-way functions,” said Saptarshi Das, assistant professor of engineering science and mechanics, Penn State. “These are easy to create in one direction, but very difficult to do in the opposite direction.”
An example of this is multiplying two prime numbers. Assuming the original numbers are very large, reverse engineering from the result becomes very time and computer-resource heavy.
“However, now that computers are becoming more powerful and quantum computing is on the horizon, using encryption that relies on its effectiveness because it is monumentally time consuming to decrypt won’t fly anymore,” Das said.
Only truly random encryption keys are unclonable and not capable of being reverse-engineered because there is no pattern or formula in the process. Even so-called random number generators are really pseudo-random number generators.
“We need to go back to nature and identify real random things,” said Das. “Because there is no mathematical basis for many biological processes, no computer can unravel them.”
The researchers, who also included Akhil Dodda, graduate student in engineering science and mechanics; Akshay Wali, graduate student in electrical engineering; and Yang Wu, postdoctoral fellow in engineering science and mechanics, looked at human T cells. They photographed a random, 2-dimensional array of T cells in solution and then digitized the image by creating pixels on the image and making the T cell pixels “ones” and the empty spaces “zeros.”
“When we started there were a few papers out using nanomaterials,” said Dodda. “However, they weather (nanomaterials) out of the material and are stationary.”
Living cells, regardless of the type, can be kept around for a long time and because they move constantly, can be photographed repeatedly to create new encryption keys.
“We need a lot of keys because the population of the world is 7 billion,” said Das. “Each person will generate a megabyte of data every second by 2020.”
Besides encryption keys for personal computers, the keys are also needed for medical, financial and business data, and much more. If something is hacked or malfunctions, this method would also allow rapid replacement of the encryption key.
“It is very difficult to reverse-engineer these systems,” said Dodda. “Not being able to reverse-engineer these keys is an area of strength.”
The researchers are currently using 2,000 T cells per encryption key. The team reports in a recent issue of Advanced Theory and Simulation that even if someone knows the key generation mechanism, including cell type, cell density, key generation rate and key sampling instance, it is impossible for anyone to breach the system. It is simply not possible from that information to bust the encryption.
“We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and anytime,” said Wali.
The Latest on: Biological species-encrypted security systems
via Google News
The Latest on: Biological species-encrypted security systems
- How Dozens of Trump’s Political Appointees Will Stay in Government After Biden Takes Overon December 4, 2020 at 8:49 am
Documents show that officials appointed by Trump who’d otherwise lose their jobs under Biden have been approved for permanent positions in federal agencies ...
- Crooks are smart. Artificial intelligence is smarter.on December 4, 2020 at 8:36 am
AI can add an extra layer that's hard for fraudsters to beat, says Nuance Communications'.
- Three early-stage Capital Region tech startups to keep an eye onon December 3, 2020 at 1:57 pm
YDS Medicine is one of numerous Capital Region startups at various stages that are getting assistance at the multiple incubators and accelerators around the area. Here are three of those early tech ...
- Cybersecurity Flaws Could Lead to Biological Attacks: Reporton December 1, 2020 at 2:04 am
The second major factor is insufficient cybersecurity controls on lab computers. In the scenario painted in the report, a bioengineer has her PC infected with a malicious browser-plug-in, which ...
- Lincoln Laboratory establishes Biotechnology and Human Systems Divisionon November 23, 2020 at 2:12 pm
MIT Lincoln Laboratory has established a new R&D division, the Biotechnology and Human Systems Division, which will address emerging threats to both national security and humanity.
- CBRN Security And Safety Market- Future Scope, Demands And Projected Market Growth Till 2023on November 22, 2020 at 5:10 pm
Europe faces new risks of ISIS and other bio- and chemical terror attacks. These Chemical, Biological Radiological and Nuclear – CBRN security risks have been highlighted as follows:At the 2017 ...
- Biophysics: Geometry supersedes simulationson November 19, 2020 at 3:59 pm
Physicists have introduced a new method that allows biological pattern-forming systems to be systematically characterized with the aid of mathematical analysis. The trick lies in the use of ...
- Chemical, Biological, Radiological, and Nuclear (CBRN) Security Market May See Potentially High Growth Factorson November 18, 2020 at 11:56 am
Benchmark yourself with strategic steps and conclusions of Global Chemical, Biological, Radiological, and Nuclear (CBRN) Security Market recently published by HTF MI ...
- Op-Ed: COVID-19 may be teaching the world a dangerous lesson: Diseases can be ideal weaponson November 12, 2020 at 3:05 am
Yet the risks it poses to our national security ... biological weapons by stripping them of their potential for causing such devastating damage. The United States could do this by creating a ...
- Why I’m Not Sold on Autonomous Securityon November 10, 2020 at 1:30 am
Maybe you’ve heard about a new security product with super-smart AI and Machine Learning capabilities that can root out both known and unknown intrusions. The Intrusion Detection System (IDS) on this ...
via Bing News