iTnews
  • Home
  • News
  • Technology
  • Security

'Nearly unbreakable' crypto modeled off human body

By Darren Pauli on Apr 7, 2014 6:11PM
'Nearly unbreakable' crypto modeled off human body

Generates unlimited number of keys, cuts out noise.

University researchers claim to have designed a 'nearly unbreakable' cryptography model based on the human respiratory system, which they say could make life tough for criminals and spying governments.

The new class of secure communications was modelled off recent discoveries into the way the human heart and lungs coordinated rhythm information.

Three members of the University of Lancaster's physics department designed the system, which was described as "highly resistant" to attacks.

"This promises an encryption scheme that is so nearly unbreakable that it will be equally unwelcome to internet criminals and official eavesdroppers," the university's Professor Peter McClintock said.

Fellow researcher Dr Tomislav Stankovski said the novel encryption scheme built on the intersection between physics and biology was "radically different" from existing schemes.

"Inspired by the time-varying nature of the cardio-respiratory coupling functions recently discovered in humans, we propose a new encryption scheme that is highly resistant to conventional methods of attack," Dr Stankovski said.

The platform, the trio of researchers explain, uses biological coupling functions to offer an infinite number of secret encryption key choices making it "virtually impossible" for attackers to crack.

Several of these secure streams could be transmitted at once, enabling all of a users' devices to run on one encryption key instead of dozens of variants.

The system is "exceptionally resistant" to interference from random fluctuations -- or noise -- that affects communications systems, the researcgers claim.

That meant the system was useful for landline and mobile phones and a variety of wireless communications that endured a large amount of external interference.

"Our scheme is highly modular and is readily extendable to support far more complex and diverse communications applications than [those] examples," the researchers wrote in a paper (pdf).

They predicted the previously theoretical concept of coupling-function encryption would have a huge impact on many experimental implementations.

The crypto system
The crypto system

The researchers explained the crypto system in the above figure:

"A number of information signals coming from different channels or communications devices (e.g., mobile phone, sensor networks, or wireless broadband) are to be transmitted simultaneously.

Each of the signals is encrypted in a coupling function; i.e., they serve as coupling scale parameters in the nonlinear coupling functions between two self-sustained systems in the transmitter. Two signals, one from each system, are transmitted through the public channel.

At the receiving end, two similar systems are enslaved, i.e., completely synchronised, by the two transmitted signals. Finally, by applying time-evolving Bayesian inference to the reconstructed systems, one can infer the model parameters and decrypt the information signals. An important feature of the scheme is the private key holding information about the particular coupling functions in use - which, in principle, has an unbounded continuum of possible combinations.

The number of coupling functions in use will always be finite, depending on the specific number of information channels that are needed; the choice of forms available for the coupling functions (forming the private key) is, however, unbounded."

 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
biologycouplingfunctioncryptographyinfoseclancasterphysicssecurityuniversity

Partner Content

Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Digital signatures propel Australian Unity with rapid time to value
Digital signatures propel Australian Unity with rapid time to value
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Darren Pauli
Apr 7 2014
6:11PM
0 Comments

Related Articles

  • Post-quantum cryptography algorithms named
  • Java 15 introduced a cryptographic vulnerability
  • FBI says Russian hackers scanning US energy systems
  • ASD says quantum no immediate threat to encrypted government data
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

Australian court finds insurer not liable for ransomware clean-up costs

Australian court finds insurer not liable for ransomware clean-up costs

NBN Co proposes to axe CVC across all plans by mid-2026

NBN Co proposes to axe CVC across all plans by mid-2026

Wesfarmers to stand up offensive cyber security capabilities

Wesfarmers to stand up offensive cyber security capabilities

Digital Nation

Domino’s invests in observability for zero contact delivery
Domino’s invests in observability for zero contact delivery
Metaverses on the agenda for Dominello, Husic ministerial meeting
Metaverses on the agenda for Dominello, Husic ministerial meeting
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Australia will lose 11 percent of jobs to automation by 2040: Forrester
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
Criteo to fork out $94.7m for consent breaches
Criteo to fork out $94.7m for consent breaches
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.