Submitted via IRC for Bytram
Better security achieved with randomly generating biological encryption keys
"Currently, encryption is done with mathematical algorithms that are called one-way functions," said Saptarshi Das, assistant professor of engineering science and mechanics, Penn State. "These are easy to create in one direction, but very difficult to do in the opposite direction."
An example of this is multiplying two prime numbers. Assuming the original numbers are very large, reverse engineering from the result becomes very time and computer-resource heavy.
"However, now that computers are becoming more powerful and quantum computing is on the horizon, using encryption that relies on its effectiveness because it is monumentally time consuming to decrypt won't fly anymore," Das said.
[...] The researchers are currently using 2,000 T cells per encryption key. The team reports in a recent issue of Advanced Theory and Simulations that even if someone knows the key generation mechanism, including cell type, cell density, key generation rate and key sampling instance, it is impossible for anyone to breach the system. It is simply not possible from that information to bust the encryption.
(Score: 4, Funny) by edIII on Friday December 21 2018, @07:01AM (2 children)
For a second there I thought that it meant I would have to sign my messages with my own biological material. I can't possibly see how that would scale since I would need at least 20 minutes inbetween messages.
Technically, lunchtime is at any moment. It's just a wave function.
(Score: 3, Funny) by DeathMonkey on Friday December 21 2018, @07:19PM
Yes, but on the other hand, identity theft becomes a lot more fun.
(Score: 1, Funny) by Anonymous Coward on Friday December 21 2018, @08:06PM
Fleshlight security dongles... We need these ASAP so there's a valid reason to watch porn at work.