Data breaches, hacked systems and hostage malware are frequently topics of evening news casts — including stories of department store, hospital, government and bank data leaking into unsavory hands — but now a team of engineers has an encryption key approach that is unclonable and not reverse-engineerable, protecting information even as computers become faster and nimbler.
“Currently, encryption is done with mathematical algorithms that are called one-way functions,” said Saptarshi Das, assistant professor of engineering science and mechanics, Penn State. “These are easy to create in one direction, but very difficult to do in the opposite direction.”
An example of this is multiplying two prime numbers. Assuming the original numbers are very large, reverse engineering from the result becomes very time and computer-resource heavy.
“However, now that computers are becoming more powerful and quantum computing is on the horizon, using encryption that relies on its effectiveness because it is monumentally time consuming to decrypt won’t fly anymore,” Das said.
Only truly random encryption keys are unclonable and not capable of being reverse-engineered because there is no pattern or formula in the process. Even so-called random number generators are really pseudo-random number generators.
“We need to go back to nature and identify real random things,” said Das. “Because there is no mathematical basis for many biological processes, no computer can unravel them.”
The researchers, who also included Akhil Dodda, graduate student in engineering science and mechanics; Akshay Wali, graduate student in electrical engineering; and Yang Wu, postdoctoral fellow in engineering science and mechanics, looked at human T cells. They photographed a random, 2-dimensional array of T cells in solution and then digitized the image by creating pixels on the image and making the T cell pixels “ones” and the empty spaces “zeros.”
“When we started there were a few papers out using nanomaterials,” said Dodda. “However, they weather (nanomaterials) out of the material and are stationary.”
Living cells, regardless of the type, can be kept around for a long time and because they move constantly, can be photographed repeatedly to create new encryption keys.
“We need a lot of keys because the population of the world is 7 billion,” said Das. “Each person will generate a megabyte of data every second by 2020.”
Besides encryption keys for personal computers, the keys are also needed for medical, financial and business data, and much more. If something is hacked or malfunctions, this method would also allow rapid replacement of the encryption key.
“It is very difficult to reverse-engineer these systems,” said Dodda. “Not being able to reverse-engineer these keys is an area of strength.”
The researchers are currently using 2,000 T cells per encryption key. The team reports in a recent issue of Advanced Theory and Simulation that even if someone knows the key generation mechanism, including cell type, cell density, key generation rate and key sampling instance, it is impossible for anyone to breach the system. It is simply not possible from that information to bust the encryption.
“We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and anytime,” said Wali.
The Latest on: Biological species-encrypted security systems
via Google News
The Latest on: Biological species-encrypted security systems
- Visiongain Report Claims There is Huge Potential within the $5.8 Billion Directed Energy Weapons (DEW) Market on February 20, 2019 at 2:00 am
The integration of directed energy in chemical, biological ... Azimuth Corporation • BAE Systems plc • Battelle • The Boeing Company • General Atomics • General Dynamics Corporation • Kratos Defense & ... […]
- The 4 Legal Challenges Facing Trump's Emergency Declaration on February 19, 2019 at 4:05 pm
During the Rose Garden speech announcing his plan, Trump detailed in a sing-song voice the path he expected the emergency declaration to take through the court system, all the way ... needed defense f... […]
- Swarming attack drones could soon be real weapons for the military on February 19, 2019 at 2:00 pm
And some widely publicized systems tests in the United States have shown how the ... Paul Scharre, a senior fellow with the Center for New American Security, said Williamson's plan would place Britain ... […]
- Arizona Bill Proposes Forced DNA Samples After Nurse Is Charged With Impregnating Incapacitated Woman on February 19, 2019 at 1:14 pm
Arizona has a DNA identification system that was established by the Department ... last known address and social security number if it’s available. Although the biological sample is to be destroyed im... […]
- Daily on Energy, presented by GAIN: Green group tops 100 lawsuits against Trump on February 19, 2019 at 10:25 am
The Center for Biological Diversity, the group that led the charge on ... more transparent national labeling system that favors consumer awareness. Environmentalists say strong labeling rules can be u... […]
- FDA Milestones on February 19, 2019 at 9:36 am
Authorizes the FDA to collect fees from companies that produce certain human drug and biological products ... of the bill—the Drug Supply Chain Security Act—outlines steps for an electronic and intero... […]
- Homeland Security replacing troubled biodefense system with another flawed approach on February 15, 2019 at 11:00 am
McDonnell, an assistant secretary of Homeland Security ... the system — which has cost $1.6 billion so far — is not reliable. The new system will depend on so-called trigger devices that use fluoresce... […]
- IAEA Completes Nuclear Security Advisory Mission in Lebanon on February 15, 2019 at 2:20 am
The team met in Beirut with officials from the Chemical, Biological, Radiological and Nuclear (CBRN ... During missions, a team of international experts observes a nation's nuclear security systems an... […]
- Drones of Mass Destruction: Drone Swarms and the Future of Nuclear, Chemical, and Biological Weapons on February 14, 2019 at 1:08 am
U.S. national security ... systems. This also means the drones would not need to carry as much agent. Moreover, drone swarms enable the use of combined arms tactics. Some attack drones within the swar... […]
- The Cybersecurity 202: Trump gave the military freer rein for offensive hacking. Security experts say that’s a good idea. on February 11, 2019 at 5:02 am
“Cyberweapons need to be treated akin to chemical, biological ... improve state election systems against cyber intrusions — though the bill stalled amid skepticism from the White House and some state ... […]
via Bing News