Data breaches, hacked systems and hostage malware are frequently topics of evening news casts — including stories of department store, hospital, government and bank data leaking into unsavory hands — but now a team of engineers has an encryption key approach that is unclonable and not reverse-engineerable, protecting information even as computers become faster and nimbler.
“Currently, encryption is done with mathematical algorithms that are called one-way functions,” said Saptarshi Das, assistant professor of engineering science and mechanics, Penn State. “These are easy to create in one direction, but very difficult to do in the opposite direction.”
An example of this is multiplying two prime numbers. Assuming the original numbers are very large, reverse engineering from the result becomes very time and computer-resource heavy.
“However, now that computers are becoming more powerful and quantum computing is on the horizon, using encryption that relies on its effectiveness because it is monumentally time consuming to decrypt won’t fly anymore,” Das said.
Only truly random encryption keys are unclonable and not capable of being reverse-engineered because there is no pattern or formula in the process. Even so-called random number generators are really pseudo-random number generators.
“We need to go back to nature and identify real random things,” said Das. “Because there is no mathematical basis for many biological processes, no computer can unravel them.”
The researchers, who also included Akhil Dodda, graduate student in engineering science and mechanics; Akshay Wali, graduate student in electrical engineering; and Yang Wu, postdoctoral fellow in engineering science and mechanics, looked at human T cells. They photographed a random, 2-dimensional array of T cells in solution and then digitized the image by creating pixels on the image and making the T cell pixels “ones” and the empty spaces “zeros.”
“When we started there were a few papers out using nanomaterials,” said Dodda. “However, they weather (nanomaterials) out of the material and are stationary.”
Living cells, regardless of the type, can be kept around for a long time and because they move constantly, can be photographed repeatedly to create new encryption keys.
“We need a lot of keys because the population of the world is 7 billion,” said Das. “Each person will generate a megabyte of data every second by 2020.”
Besides encryption keys for personal computers, the keys are also needed for medical, financial and business data, and much more. If something is hacked or malfunctions, this method would also allow rapid replacement of the encryption key.
“It is very difficult to reverse-engineer these systems,” said Dodda. “Not being able to reverse-engineer these keys is an area of strength.”
The researchers are currently using 2,000 T cells per encryption key. The team reports in a recent issue of Advanced Theory and Simulation that even if someone knows the key generation mechanism, including cell type, cell density, key generation rate and key sampling instance, it is impossible for anyone to breach the system. It is simply not possible from that information to bust the encryption.
“We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and anytime,” said Wali.
The Latest on: Biological species-encrypted security systems
via Google News
The Latest on: Biological species-encrypted security systems
- TiVo takes personalization to the next level with voice IDon January 26, 2021 at 8:00 am
TiVo and voice authentication company, Pindrop, have joined forces to let TiVo users get personalized content recommendations using just their voices.
- Aviation security: we need to talk about mental healthon January 26, 2021 at 6:20 am
The final edition of the excellent magazine Aviation Security International has gone to press – another casualty of the slump in aviation. For almost quarter of a century, its editor, Philip Baum, has ...
- Joe Lieberman, Tom Ridge: How America can end threat of future pandemics by 2030on January 26, 2021 at 3:13 am
Through an Apollo Program for Biodefense, we can make invisible biological enemies visible and take pandemic threats off the table by 2030.
- Overview: Blueprints for international security for the 2020son January 25, 2021 at 6:29 am
From oceans rising to geopolitical competition with China and Russia, in these International Security papers for Brookings’s Blueprints for American Renewal & Prosperity, Brookings scholars ask how to ...
- Expert warns on increasing threats to food security and livelihoodson January 24, 2021 at 8:09 pm
A consultant to the World Bank, Prof Abel Ogunwale, has called for increased monitoring to prevent farmers from losing their..
- Biological weapons 'same threat as atomic bomb' - THOUSANDS of labs capable of Covid leakon January 24, 2021 at 7:08 am
COVID-19 has transformed our understanding of biological attacks but the threat is not being taken seriously, one of the UK's foremost experts warned last night.
- Health security needs strengthening in wake of COVID-19 pandemicon January 18, 2021 at 9:11 pm
In 2019, fewer than 5% of countries had the public health and governance systems to respond rapidly to outbreaks and mitigate their spread ...
- Engineering faculty member wins Air Force Research grant for work in improvements to neuromorphic computing systemson January 17, 2021 at 3:04 pm
Faculty-researcher Cory Merkel recently received a grant from the Air Force Research Lab for developing more secure AI functionality including how it defends against system attacks, and, through ...
- Global Chemical, Biological, Radiological and Nuclear (CBRN) Security Market 2020 Share, Trend, Segmentation and Forecast to 2026on January 7, 2021 at 6:20 am
New Study Reports "Chemical, Biological, Radiological and Nuclear (CBRN) Security Market 2020 Global Market Opportunities, Challenges, Strategies and Forecasts 2026" has been Added on WiseGuyReports.
- T cell photos make data encryption truly randomon December 30, 2020 at 4:00 pm
“We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and anytime,” says Akshay Wali, a graduate student in electrical ...
via Bing News