Stories
Slash Boxes
Comments

SoylentNews is people

posted by mrpg on Friday December 21 2018, @05:00AM   Printer-friendly
from the rnd(bio) dept.

Submitted via IRC for Bytram

Better security achieved with randomly generating biological encryption keys

"Currently, encryption is done with mathematical algorithms that are called one-way functions," said Saptarshi Das, assistant professor of engineering science and mechanics, Penn State. "These are easy to create in one direction, but very difficult to do in the opposite direction."

An example of this is multiplying two prime numbers. Assuming the original numbers are very large, reverse engineering from the result becomes very time and computer-resource heavy.

"However, now that computers are becoming more powerful and quantum computing is on the horizon, using encryption that relies on its effectiveness because it is monumentally time consuming to decrypt won't fly anymore," Das said.

[...] The researchers are currently using 2,000 T cells per encryption key. The team reports in a recent issue of Advanced Theory and Simulations that even if someone knows the key generation mechanism, including cell type, cell density, key generation rate and key sampling instance, it is impossible for anyone to breach the system. It is simply not possible from that information to bust the encryption.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by The Mighty Buzzard on Friday December 21 2018, @05:35AM (4 children)

    by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Friday December 21 2018, @05:35AM (#777094) Homepage Journal

    I really hate idiocy in reporting. They didn't do a damned thing except make a good RNG. If your RNG can be exploited remotely, you're already fucked. Ditto if the attacker has enough access to your system to determine the inputs to an algorithmic RNG. A truly good RNG would be a nice thing to have but it's not remotely going to revolutionize crypto.

    --
    My rights don't end where your fear begins.
    Starting Score:    1  point
    Moderation   +1  
       Informative=1, Total=1
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 0) by Anonymous Coward on Friday December 21 2018, @06:26AM

    by Anonymous Coward on Friday December 21 2018, @06:26AM (#777102)

    Ionizing radiation smoke detectors make a good RNG.
    Probably older than this one exists [etoan.com]

  • (Score: 4, Funny) by edIII on Friday December 21 2018, @07:01AM (2 children)

    by edIII (791) on Friday December 21 2018, @07:01AM (#777110)

    For a second there I thought that it meant I would have to sign my messages with my own biological material. I can't possibly see how that would scale since I would need at least 20 minutes inbetween messages.

    --
    Technically, lunchtime is at any moment. It's just a wave function.
    • (Score: 3, Funny) by DeathMonkey on Friday December 21 2018, @07:19PM

      by DeathMonkey (1380) on Friday December 21 2018, @07:19PM (#777287) Journal

      Yes, but on the other hand, identity theft becomes a lot more fun.

    • (Score: 1, Funny) by Anonymous Coward on Friday December 21 2018, @08:06PM

      by Anonymous Coward on Friday December 21 2018, @08:06PM (#777303)

      Fleshlight security dongles... We need these ASAP so there's a valid reason to watch porn at work.