Researchers at Pennsylvania State University claim to have achieved better security by using human T cells to create encryption keys, and say these keys are extremely difficult to reverse engineer.
The team photographed a random two-dimensional array of T cells in solution. digitised the image by creating pixels on it and marked the pixels as "ones" and the empty spaces as "zeros", the website Phys.org reported .
The researchers ― assistant professor of engineering science and mechanics Saptarshi Das, graduate student in engineering science and mechanics Akhil Dodda, graduate student in electrical engineering Akshay Wali and postdoctoral fellow in engineering science and mechanic Yang Wu ― said this approach to creating encryption keys could not be cloned or reverse engineered.
Said Das: "Currently, encryption is done with mathematical algorithms that are called one-way functions. These are easy to create in one direction, but very difficult to do in the opposite direction.
"However, now that computers are becoming more powerful and quantum computing is on the horizon, using encryption that relies on its effectiveness because it is monumentally time-consuming to decrypt won't fly anymore."
The team used living cells because they can be kept around for a long time and, as they move around, can be photographed repeatedly to create new encryption keys.
They are using 2000 T cells per key at the moment and said in a recent paper that even if someone knew the mechanism for key generation ― including cell type, cell density, key generation rate and key sampling instance ― it was not possible to breach the system using that information.
Said Wali: "We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and any time."REASON TO CHOOSE TENDA MESH WIFI
Our Mesh WiFi system MW3 is the first in Australia market with price below AUD$200 for a set of three.
Best valued product
Strong signal covering up to 300m2 for MW3 and 500m2 for MW6
Aesthetically pleasing and light weigh (blend into any room deco)
Wireline backhauls supported
Product units are pre-paired and easy to setup
Not requiring phone number or email address to set up
Wall penetration (better than other similar brands)
Seamless WiFi roaming
User friendly app with controls to setup a guest network, parental controls for disabling groups of devices you allocate to individuals, QoS and more
CLICK FOR MORE INFO!LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK
Australia is a cyber espionage hot spot.
As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.
It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.
In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.
Cyber security can no longer be ignored, in this white paper you’ll learn:
How does business security get breached?
What can it cost to get it wrong?
6 actionable tips