Share this

Article Facebook

Twitter

Email You are free to share this article under the Attribution 4.0 International license. University Penn State

A new encryption method uses T cells to protect data from hackers and malware.

The biological encryption key approach is unclonable and not reverse-engineerable, protecting information even as computers become faster and nimbler, researchers say.

“Currently, encryption is done with mathematical algorithms that are called one-way functions,” says Saptarshi Das, assistant professor of engineering science and mechanics at Penn State. “These are easy to create in one direction, but very difficult to do in the opposite direction.”

An example of this is multiplying two prime numbers. Assuming the original numbers are very large, reverse engineering from the result becomes very time and computer-resource heavy.

“Because there is no mathematical basis for many biological processes, no computer can unravel them.”

“However, now that computers are becoming more powerful and quantum computing is on the horizon, using encryption that relies on its effectiveness because it is monumentally time consuming to decrypt won’t fly anymore,” Das says.

Only truly random encryption keys are unclonable and not capable of being reverse-engineered because there is no pattern or formula in the process. Even so-called random number generators are really pseudo-random number generators.

“We need to go back to nature and identify real random things,” says Das. “Because there is no mathematical basis for many biological processes, no computer can unravel them.”

The researchers looked at human T cells. They photographed a random, 2-dimensional array of T cells in solution and then digitized the image by creating pixels on the image and making the T cell pixels “ones” and the empty spaces “zeros.”

“When we started there were a few papers out using nanomaterials,” says Akhil Dodda, a graduate student in engineering science and mechanics. “However, they weather (nanomaterials) out of the material and are stationary.”

Living cells, regardless of the type, can be kept around for a long time and, because they move constantly, photographed repeatedly to create new encryption keys.

“We need a lot of keys because the population of the world is 7 billion,” says Das. “Each person will generate a megabyte of data every second by 2020.”

“Not being able to reverse-engineer these keys is an area of strength.”

Besides encryption keys for personal computers, the keys are also needed for medical, financial, and business data, and much more. If something is hacked or malfunctions, this method would also allow rapid replacement of the encryption key.

“It is very difficult to reverse-engineer these systems,” says Dodda. “Not being able to reverse-engineer these keys is an area of strength.”

The researchers are currently using 2,000 T cells per encryption key. The team reports in the journal Advanced Theory and Simulation that even if someone knows the key generation mechanism, including cell type, cell density, key generation rate, and key sampling instance, it is impossible for anyone to breach the system. It is simply not possible from that information to bust the encryption.

“We need something secure, and biological species-encrypted security systems will keep our data safe and secure everywhere and anytime,” says Akshay Wali, a graduate student in electrical engineering..

Additional researchers are from Penn State; Intel Labs; and Amrita Vishwa Vidyapeetham in Kerala, India. The researchers have applied for a provisional patent on this work.

Source: Penn State