Data breaches, hacked systems and hostage malware are frequently topics of evening news casts — including stories of department store, hospital, government and bank data leaking into unsavory hands — but now a team of engineers has an encryption key approach that is unclonable and not reverse-engineerable, protecting information even as computers become faster and nimbler.
“Currently, encryption is done with mathematical algorithms that are called one-way functions,” said Saptarshi Das, assistant professor of engineering science and mechanics, Penn State. “These are easy to create in one direction, but very difficult to do in the opposite direction.”
An example of this is multiplying two prime numbers. Assuming the original numbers are very large, reverse engineering from the result becomes very time and computer-resource heavy.
“However, now that computers are becoming more powerful and quantum computing is on the horizon, using encryption that relies on its effectiveness because it is monumentally time consuming to decrypt won’t fly anymore,” Das said.
Only truly random encryption keys are unclonable and not capable of being reverse-engineered because there is no pattern or formula in the process. Even so-called random number generators are really pseudo-random number generators.
“We need to go back to nature and identify real random things,” said Das. “Because there is no mathematical basis for many biological processes, no computer can unravel them.”
The researchers, who also included Akhil Dodda, graduate student in engineering science and mechanics; Akshay Wali, graduate student in electrical engineering; and Yang Wu, postdoctoral fellow in engineering science and mechanics, looked at human T cells. They photographed a random, 2-dimensional array of T cells in solution and then digitized the image by creating pixels on the image and making the T cell pixels “ones” and the empty spaces “zeros.”
“When we started there were a few papers out using nanomaterials,” said Dodda. “However, they weather (nanomaterials) out of the material and are stationary.”
Living cells, regardless of the type, can be kept around for a long time and because they move constantly, can be photographed repeatedly to create new encryption keys.
“We need a lot of keys because the population of the world is 7 billion,” said Das. “Each person will generate a megabyte of data every second by 2020.”
Besides encryption keys for personal computers, the keys are also needed for medical, financial and business data, and much more. If something is hacked or malfunctions, this method would also allow rapid replacement of the encryption key.
“It is very difficult to reverse-engineer these systems,” said Dodda. “Not being able to reverse-engineer these keys is an area of strength.”
The researchers are currently using 2,000 T cells per encryption key. The team reports in a recent issue of Advanced Theory and Simulation that even if someone knows the key generation mechanism, including cell type, cell density, key generation rate and key sampling instance, it is impossible for anyone to breach the system. It is simply not possible from that information to bust the encryption.
“We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and anytime,” said Wali.
The Latest on: Biological species-encrypted security systems
[google_news title=”” keyword=”biological species-encrypted security systems” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
via Google News
The Latest on: Biological species-encrypted security systems
- Best DIY Home Security Systems of 2024on February 29, 2024 at 11:41 pm
She currently resides in Charlotte, N.C., where she has been working as an Editor I, covering a variety of topics across CNET's Home and Wellness teams, including home security, fitness and ...
- Home Security Systemson February 29, 2024 at 4:00 pm
Home Security System Ratings Choose the right DIY wireless home security system for your home and budget. The best home security systems in our tests are easy to set up, have great video quality ...
- Best Home Security Systems Of 2024on February 29, 2024 at 2:56 am
Commissions do not affect our editors' opinions or evaluations. Home security systems help keep your family and possessions safe while you’re home or away. The best home security systems provide ...
- Best Home Security Systemson February 21, 2024 at 1:10 pm
Is it safe and secure ... system and has an edge on the competition when it comes to self-monitoring, DIY installation, and other features. Vivint and ADT follow Ring in our rating as top home ...
- Best Apartment Security Systems in 2024on February 7, 2024 at 9:00 am
To put together our list of the best home security systems for renters, we tested every major security system on the market, from professionally installed systems to DIY ones. In general ...
- Best smart home security system with monitoring in 2024on February 6, 2024 at 4:00 pm
Read More. Home security systems are meant to provide safety and peace of mind day and night. Home monitoring products are more efficient than ever before, including outdoor security cameras that ...
- Does your home need a security system?on February 4, 2024 at 5:06 pm
Can a home security system help? In most cases, it can, but there are many options to consider. At the low end of the scale are do-it-yourself things like exterior motion-sensing lights.
- ChatGPT creator building ‘early warning system’ for AI biological weapon – but says it probably won’t happenon February 1, 2024 at 10:39 am
says it is building an early warning system that would alert people if artificial intelligence was able to make a biological weapon. But artificial intelligence only appears to pose a slight risk ...
- The Growing Impact of Analytical Techniques in Securityon January 9, 2024 at 3:06 am
In an era constantly exposed to security threats, chemical and biological attacks, and identity thefts, government bodies, and security agencies are increasingly relying on analytical techniques to ...
- The Best Home Security Systemon January 5, 2024 at 10:27 am
It’s a big difference, and it’s why we think a professionally monitored system is fundamentally more secure. All home security systems use a base station to communicate with sensors and other ...
via Bing News