Home Security Scientists claim better security with biological encryption keys
Scientists claim better security with biological encryption keys Pixabay

Researchers at Pennsylvania State University claim to have achieved better security by using human T cells to create encryption keys, and say these keys are extremely difficult to reverse engineer.

The team photographed a random two-dimensional array of T cells in solution. digitised the image by creating pixels on it and marked the pixels as "ones" and the empty spaces as "zeros", the website Phys.org reported.

The researchers — assistant professor of engineering science and mechanics Saptarshi Das, graduate student in engineering science and mechanics Akhil Dodda, graduate student in electrical engineering Akshay Wali and postdoctoral fellow in engineering science and mechanic Yang Wu — said this approach to creating encryption keys could not be cloned or reverse engineered.

Said Das: "Currently, encryption is done with mathematical algorithms that are called one-way functions. These are easy to create in one direction, but very difficult to do in the opposite direction.

"However, now that computers are becoming more powerful and quantum computing is on the horizon, using encryption that relies on its effectiveness because it is monumentally time-consuming to decrypt won't fly anymore."

The team used living cells because they can be kept around for a long time and, as they move around, can be photographed repeatedly to create new encryption keys.

They are using 2000 T cells per key at the moment and said in a recent paper that even if someone knew the mechanism for key generation — including cell type, cell density, key generation rate and key sampling instance — it was not possible to breach the system using that information.

Said Wali: "We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and any time."

CDAO SYDNEY TURNS 5 IN 2019

With 50+ Speakers, 300+ senior data and analytics executives, over 3 exciting days you will indulge in all things data and analytics before leaving with strategic takeaways that will catapult you ahead on your journey

· CDAO Sydney is designed to bring together senior executives in data and analytics from progressive organisations
· Improve operations and services
· Future proof your organisation in this rapidly changing technological landscape
· CDAO Sydney 2-4 April 2019
· Don’t miss out! Register Today!
· Want to find out more? Download the Agenda

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect