'Unbreakable' security codes inspired by nature

Apr 04, 2014

A revolutionary new method of encrypting confidential information has been patented by scientists at Lancaster University.

They have been inspired by their discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other.

A mathematical model based on the complex interaction between these organs has now been transferred to the world of modern communications. 

This discovery could transform daily life which is reliant on secure electronic communications for everything from mobiles to sensor networks and the internet.

Every device, from your car key to online bank account, contains different identification codes enabling information to be transferred in confidence. But the race to outwit the hackers means there is a continual demand for better encryption methods.

Inspiration for the new method of encryption came from interdisciplinary research in the Physics Department (www.physics.lancs.ac.uk/resear… d-biomedical-physics) by Dr Tomislav Stankovski, Professor Peter McClintock, and Professor Aneta Stefanovska, and the patent includes Dr Robert Young.

Professor McClintock commented that this is a significant discovery.

He said: "This promises an that is so nearly unbreakable that it will be equally unwelcome to internet criminals and official eavesdroppers."

Professor Stefanovska emphasized the interdisciplinary aspect: "As so often happens with important breakthroughs, this discovery was made right on the boundary between two different subjects – because we were applying physics to biology."

Dr Stankovski said: "Here we offer a novel encryption scheme derived from biology, radically different from any earlier procedure. Inspired by the time-varying nature of the cardio-respiratory coupling functions recently discovered in humans, we propose a new encryption scheme that is highly resistant to conventional methods of attack."

The advantage of this discovery is that it offers an infinite number of choices for the secret encryption key shared between the sender and receiver. This makes it virtually impossible for hackers and eavesdroppers to crack the code.

The new method is exceptionally resistant to interference from the random fluctuations or "noise" which affects all communications systems.

It can also transmit several different information streams simultaneously, enabling all the digital devices in the home, for example, to operate on one encryption key instead of dozens of different ones.

Explore further: More secure communications thanks to quantum physics

More information: Tomislav Stankovski, Peter V. E. McClintock, and Aneta Stefanovska , "Coupling Functions Enable Secure Communications," American Physical Society's journal Physical Review X, journals.aps.org/prx/abstract/… 03/PhysRevX.4.011026

add to favorites email to friend print save as pdf

Related Stories

Advancing privacy and security in the cloud

Dec 24, 2013

IBM inventors have received a patent for a breakthrough data encryption technique that is expected to further data privacy and strengthen cloud computing security.

More secure communications thanks to quantum physics

Mar 12, 2014

One of the recent revelations by Edward Snowden is that the U.S. National Security Agency is currently developing a quantum computer. Physicists aren't surprised by this news; such a computer could crack the encryption that ...

Baffle thy enemy: The case for Honey Encryption

Jan 30, 2014

(Phys.org) —Database breaches are making today's headlines, revealing events where thieves scoff up millions of passwords. Security experts meanwhile think about, talk about and work towards fighting against ...

Beefing up public-key encryption

Feb 18, 2013

Most financial transactions on the Internet are safeguarded by a cryptographic technique called public-key encryption. Where traditional encryption relies on a single secret key, shared by both sender and ...

Recommended for you

Finding faster-than-light particles by weighing them

10 hours ago

In a new paper accepted by the journal Astroparticle Physics, Robert Ehrlich, a recently retired physicist from George Mason University, claims that the neutrino is very likely a tachyon or faster-than-light par ...

Controlling core switching in Pac-man disks

Dec 24, 2014

Magnetic vortices in thin films can encode information in the perpendicular magnetization pointing up or down relative to the vortex core. These binary states could be useful for non-volatile data storage ...

Atoms queue up for quantum computer networks

Dec 24, 2014

In order to develop future quantum computer networks, it is necessary to hold a known number of atoms and read them without them disappearing. To do this, researchers from the Niels Bohr Institute have developed ...

New video supports radiation dosimetry audits

Dec 23, 2014

The National Physical Laboratory (NPL), working with the National Radiotherapy Trials Quality Assurance Group, has produced a video guide to support physicists participating in radiation dosimetry audits.

Acoustic tweezers manipulate cell-to-cell contact

Dec 22, 2014

Sound waves can precisely position groups of cells for study without the danger of changing or damaging the cells, according to a team of Penn State researchers who are using surface acoustic waves to manipulate ...

User comments : 2

Adjust slider to filter visible comments by rank

Display comments: newest first

antialias_physorg
not rated yet Apr 04, 2014
Having a secure key isn't a problem. Sharing the key without direct contact is (that is why quantum cryptography is so enticing).

But the idea that there's no easy way to listen in on the data transmission by making it indistinguishable from noise is certainly worth pursuing
alfie_null
not rated yet Apr 05, 2014
Looking forward to a sample implementation that can be reviewed by others. Features mentioned - "infinite" number of keys, resistance to "noise" - are dealt with in existing encryption techniques. How superior is this new technique?

Unbreakable techniques have been discovered in the past. Over and over again. Turns out it's pretty hard to accomplish.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.