'Unbreakable' security codes inspired by nature

Apr 04, 2014

A revolutionary new method of encrypting confidential information has been patented by scientists at Lancaster University.

They have been inspired by their discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other.

A mathematical model based on the complex interaction between these organs has now been transferred to the world of modern communications. 

This discovery could transform daily life which is reliant on secure electronic communications for everything from mobiles to sensor networks and the internet.

Every device, from your car key to online bank account, contains different identification codes enabling information to be transferred in confidence. But the race to outwit the hackers means there is a continual demand for better encryption methods.

Inspiration for the new method of encryption came from interdisciplinary research in the Physics Department (www.physics.lancs.ac.uk/resear… d-biomedical-physics) by Dr Tomislav Stankovski, Professor Peter McClintock, and Professor Aneta Stefanovska, and the patent includes Dr Robert Young.

Professor McClintock commented that this is a significant discovery.

He said: "This promises an that is so nearly unbreakable that it will be equally unwelcome to internet criminals and official eavesdroppers."

Professor Stefanovska emphasized the interdisciplinary aspect: "As so often happens with important breakthroughs, this discovery was made right on the boundary between two different subjects – because we were applying physics to biology."

Dr Stankovski said: "Here we offer a novel encryption scheme derived from biology, radically different from any earlier procedure. Inspired by the time-varying nature of the cardio-respiratory coupling functions recently discovered in humans, we propose a new encryption scheme that is highly resistant to conventional methods of attack."

The advantage of this discovery is that it offers an infinite number of choices for the secret encryption key shared between the sender and receiver. This makes it virtually impossible for hackers and eavesdroppers to crack the code.

The new method is exceptionally resistant to interference from the random fluctuations or "noise" which affects all communications systems.

It can also transmit several different information streams simultaneously, enabling all the digital devices in the home, for example, to operate on one encryption key instead of dozens of different ones.

Explore further: More secure communications thanks to quantum physics

More information: Tomislav Stankovski, Peter V. E. McClintock, and Aneta Stefanovska , "Coupling Functions Enable Secure Communications," American Physical Society's journal Physical Review X, journals.aps.org/prx/abstract/… 03/PhysRevX.4.011026

add to favorites email to friend print save as pdf

Related Stories

Advancing privacy and security in the cloud

Dec 24, 2013

IBM inventors have received a patent for a breakthrough data encryption technique that is expected to further data privacy and strengthen cloud computing security.

More secure communications thanks to quantum physics

Mar 12, 2014

One of the recent revelations by Edward Snowden is that the U.S. National Security Agency is currently developing a quantum computer. Physicists aren't surprised by this news; such a computer could crack the encryption that ...

Baffle thy enemy: The case for Honey Encryption

Jan 30, 2014

(Phys.org) —Database breaches are making today's headlines, revealing events where thieves scoff up millions of passwords. Security experts meanwhile think about, talk about and work towards fighting against ...

Beefing up public-key encryption

Feb 18, 2013

Most financial transactions on the Internet are safeguarded by a cryptographic technique called public-key encryption. Where traditional encryption relies on a single secret key, shared by both sender and ...

Recommended for you

New pathway to valleytronics

12 hours ago

A potential avenue to quantum computing currently generating quite the buzz in the high-tech industry is "valleytronics," in which information is coded based on the wavelike motion of electrons moving through ...

New portable vacuum standard

Jan 26, 2015

A novel Portable Vacuum Standard (PVS) has been added to the roster of NIST's Standard Reference Instruments (SRI). It is now available for purchase as part of NIST's ongoing commitment to disseminate measurement ...

Prototype for first traceable PET-MR phantom

Jan 26, 2015

As cancer diagnostic tools, a new class of imagers – which combines positron-emission tomography (PET) with magnetic resonance imaging (MR or MRI) – has shown promise in the few years since these hybrid ...

User comments : 2

Adjust slider to filter visible comments by rank

Display comments: newest first

antialias_physorg
not rated yet Apr 04, 2014
Having a secure key isn't a problem. Sharing the key without direct contact is (that is why quantum cryptography is so enticing).

But the idea that there's no easy way to listen in on the data transmission by making it indistinguishable from noise is certainly worth pursuing
alfie_null
not rated yet Apr 05, 2014
Looking forward to a sample implementation that can be reviewed by others. Features mentioned - "infinite" number of keys, resistance to "noise" - are dealt with in existing encryption techniques. How superior is this new technique?

Unbreakable techniques have been discovered in the past. Over and over again. Turns out it's pretty hard to accomplish.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.