'Unbreakable' security codes inspired by nature

Apr 04, 2014

A revolutionary new method of encrypting confidential information has been patented by scientists at Lancaster University.

They have been inspired by their discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other.

A mathematical model based on the complex interaction between these organs has now been transferred to the world of modern communications. 

This discovery could transform daily life which is reliant on secure electronic communications for everything from mobiles to sensor networks and the internet.

Every device, from your car key to online bank account, contains different identification codes enabling information to be transferred in confidence. But the race to outwit the hackers means there is a continual demand for better encryption methods.

Inspiration for the new method of encryption came from interdisciplinary research in the Physics Department (www.physics.lancs.ac.uk/resear… d-biomedical-physics) by Dr Tomislav Stankovski, Professor Peter McClintock, and Professor Aneta Stefanovska, and the patent includes Dr Robert Young.

Professor McClintock commented that this is a significant discovery.

He said: "This promises an that is so nearly unbreakable that it will be equally unwelcome to internet criminals and official eavesdroppers."

Professor Stefanovska emphasized the interdisciplinary aspect: "As so often happens with important breakthroughs, this discovery was made right on the boundary between two different subjects – because we were applying physics to biology."

Dr Stankovski said: "Here we offer a novel encryption scheme derived from biology, radically different from any earlier procedure. Inspired by the time-varying nature of the cardio-respiratory coupling functions recently discovered in humans, we propose a new encryption scheme that is highly resistant to conventional methods of attack."

The advantage of this discovery is that it offers an infinite number of choices for the secret encryption key shared between the sender and receiver. This makes it virtually impossible for hackers and eavesdroppers to crack the code.

The new method is exceptionally resistant to interference from the random fluctuations or "noise" which affects all communications systems.

It can also transmit several different information streams simultaneously, enabling all the digital devices in the home, for example, to operate on one encryption key instead of dozens of different ones.

Explore further: Advancing privacy and security in the cloud

More information: Tomislav Stankovski, Peter V. E. McClintock, and Aneta Stefanovska , "Coupling Functions Enable Secure Communications," American Physical Society's journal Physical Review X, journals.aps.org/prx/abstract/… 03/PhysRevX.4.011026

add to favorites email to friend print save as pdf

Related Stories

Advancing privacy and security in the cloud

Dec 24, 2013

IBM inventors have received a patent for a breakthrough data encryption technique that is expected to further data privacy and strengthen cloud computing security.

More secure communications thanks to quantum physics

Mar 12, 2014

One of the recent revelations by Edward Snowden is that the U.S. National Security Agency is currently developing a quantum computer. Physicists aren't surprised by this news; such a computer could crack the encryption that ...

Baffle thy enemy: The case for Honey Encryption

Jan 30, 2014

(Phys.org) —Database breaches are making today's headlines, revealing events where thieves scoff up millions of passwords. Security experts meanwhile think about, talk about and work towards fighting against ...

Beefing up public-key encryption

Feb 18, 2013

Most financial transactions on the Internet are safeguarded by a cryptographic technique called public-key encryption. Where traditional encryption relies on a single secret key, shared by both sender and ...

Recommended for you

And so they beat on, flagella against the cantilever

21 hours ago

A team of researchers at Boston University and Stanford University School of Medicine has developed a new model to study the motion patterns of bacteria in real time and to determine how these motions relate ...

Tandem microwave destroys hazmat, disinfects

Sep 16, 2014

Dangerous materials can be destroyed, bacteria spores can be disinfected, and information can be collected that reveals the country of origin of radiological isotopes - all of this due to a commercial microwave ...

Cornell theorists continue the search for supersymmetry

Sep 16, 2014

(Phys.org) —It was a breakthrough with profound implications for the world as we know it: the Higgs boson, the elementary particle that gives all other particles their mass, discovered at the Large Hadron ...

How did evolution optimize circadian clocks?

Sep 12, 2014

(Phys.org) —From cyanobacteria to humans, many terrestrial species have acquired circadian rhythms that adapt to sunlight in order to increase survival rates. Studies have shown that the circadian clocks ...

User comments : 2

Adjust slider to filter visible comments by rank

Display comments: newest first

antialias_physorg
not rated yet Apr 04, 2014
Having a secure key isn't a problem. Sharing the key without direct contact is (that is why quantum cryptography is so enticing).

But the idea that there's no easy way to listen in on the data transmission by making it indistinguishable from noise is certainly worth pursuing
alfie_null
not rated yet Apr 05, 2014
Looking forward to a sample implementation that can be reviewed by others. Features mentioned - "infinite" number of keys, resistance to "noise" - are dealt with in existing encryption techniques. How superior is this new technique?

Unbreakable techniques have been discovered in the past. Over and over again. Turns out it's pretty hard to accomplish.