Data breaches, hacked systems and hostage malware are frequently topics of evening news casts — including stories of department store, hospital, government and bank data leaking into unsavory hands — but now a team of engineers has an encryption key approach that is unclonable and not reverse-engineerable, protecting information even as computers become faster and nimbler.
“Currently, encryption is done with mathematical algorithms that are called one-way functions,” said Saptarshi Das, assistant professor of engineering science and mechanics, Penn State. “These are easy to create in one direction, but very difficult to do in the opposite direction.”
An example of this is multiplying two prime numbers. Assuming the original numbers are very large, reverse engineering from the result becomes very time and computer-resource heavy.
“However, now that computers are becoming more powerful and quantum computing is on the horizon, using encryption that relies on its effectiveness because it is monumentally time consuming to decrypt won’t fly anymore,” Das said.
Only truly random encryption keys are unclonable and not capable of being reverse-engineered because there is no pattern or formula in the process. Even so-called random number generators are really pseudo-random number generators.
“We need to go back to nature and identify real random things,” said Das. “Because there is no mathematical basis for many biological processes, no computer can unravel them.”
The researchers, who also included Akhil Dodda, graduate student in engineering science and mechanics; Akshay Wali, graduate student in electrical engineering; and Yang Wu, postdoctoral fellow in engineering science and mechanics, looked at human T cells. They photographed a random, 2-dimensional array of T cells in solution and then digitized the image by creating pixels on the image and making the T cell pixels “ones” and the empty spaces “zeros.”
“When we started there were a few papers out using nanomaterials,” said Dodda. “However, they weather (nanomaterials) out of the material and are stationary.”
Living cells, regardless of the type, can be kept around for a long time and because they move constantly, can be photographed repeatedly to create new encryption keys.
“We need a lot of keys because the population of the world is 7 billion,” said Das. “Each person will generate a megabyte of data every second by 2020.”
Besides encryption keys for personal computers, the keys are also needed for medical, financial and business data, and much more. If something is hacked or malfunctions, this method would also allow rapid replacement of the encryption key.
“It is very difficult to reverse-engineer these systems,” said Dodda. “Not being able to reverse-engineer these keys is an area of strength.”
The researchers are currently using 2,000 T cells per encryption key. The team reports in a recent issue of Advanced Theory and Simulation that even if someone knows the key generation mechanism, including cell type, cell density, key generation rate and key sampling instance, it is impossible for anyone to breach the system. It is simply not possible from that information to bust the encryption.
“We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and anytime,” said Wali.
The Latest on: Biological species-encrypted security systems
via Google News
The Latest on: Biological species-encrypted security systems
- What longtime climate activist Rafe Pomerance wants you to knowon September 20, 2019 at 8:11 am
Three, this is the largest transformation governments have to do, which is to re-work the global energy system to decarbonize it ... bleaching is a climate signal in the tropics and it is a biological ...
- A Mendelian randomization study of IL6 signaling in cardiovascular diseases, immune-related disorders and longevityon September 20, 2019 at 3:44 am
Consistent with biological data, the present findings corroborate a potential ... Hence, it is possible that anti-IL6 therapy, which has, so far, shown an adequate security profile, may increase ...
- She knows the future of global business technology, and she'll tell you about iton September 20, 2019 at 3:00 am
The fourth one is more about cyberpresence, systems and networks and internet of things. It’s a fusion of technologies that is blurring the lines between what we call the physical, digital and ...
- The next agricultural revolution is hereon September 20, 2019 at 12:16 am
As a growing population and climate change threaten food security, researchers around ... cities examples from the last 50 years of biological research and highlights the major genetic mutations ...
- Police raid Tel Aviv cyber company over suspected fraud and security crimeson September 16, 2019 at 6:24 am
Operation part of joint investigation carried out with Defense Ministry department for security at weapons industries, nuclear and biological research centers ... The police operation at Ability ...
- Security Resources For Manufacturers of Biological Productson August 28, 2019 at 10:10 am
The physical security of biological products and the facilities in which they are manufactured and otherwise held is an important public health issue. Effective security can help prevent terrorism, ...
- T cell photos make data encryption truly randomon December 31, 2018 at 6:37 am
It is simply not possible from that information to bust the encryption. “We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and ...
- Scientists claim better security with biological encryption keyson December 20, 2018 at 1:12 am
Said Wali: "We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and any time." Australia is a cyber espionage hot spot. As we ...
- Better Security Through Biological Encryptionon December 19, 2018 at 3:41 pm
"We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and anytime," said Wali.
- Better security achieved with randomly generating biological encryption keyson December 19, 2018 at 1:15 pm
It is simply not possible from that information to bust the encryption. "We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and ...
via Bing News