Tuesday, August 26, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Chemistry

Protecting art and passwords with biochemistry

April 8, 2024
in Chemistry
Reading Time: 4 mins read
0
The language of the DNA world uses the letters A, T, C and G. With suitable rules, however, this can easily be translated into a digital sequence of 0s and 1s.
66
SHARES
596
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT

Security experts fear Q-​Day, the day when quantum computers become so powerful that they can crack today’s passwords. Some experts estimate that this day will come within the next ten years. Password checks are based on cryptographic one-​way functions, which calculate an output value from an input value. This makes it possible to check the validity of a password without transmitting the password itself: the one-​way function converts the password into an output value that can then be used to check its validity in, say, online banking. What makes one-​way functions special is that it’s impossible to use their output value to deduce the input value – in other words, the password. At least not with today’s resources. However, future quantum computers could make this kind of inverse calculation easier.

The language of the DNA world uses the letters A, T, C and G. With suitable rules, however, this can easily be translated into a digital sequence of 0s and 1s.

Credit: Source: Luescher AM et al. Nature Communications 2024, edited

Security experts fear Q-​Day, the day when quantum computers become so powerful that they can crack today’s passwords. Some experts estimate that this day will come within the next ten years. Password checks are based on cryptographic one-​way functions, which calculate an output value from an input value. This makes it possible to check the validity of a password without transmitting the password itself: the one-​way function converts the password into an output value that can then be used to check its validity in, say, online banking. What makes one-​way functions special is that it’s impossible to use their output value to deduce the input value – in other words, the password. At least not with today’s resources. However, future quantum computers could make this kind of inverse calculation easier.

Researchers at ETH Zurich have now presented a cryptographic one-​way function that works differently from today’s and will also be secure in the future. Rather than processing the data using arithmetic operations, it is stored as a sequence of nucleotides – the chemical building blocks of DNA.

Based on true randomness

“Our system is based on true randomness. The input and output values are physically linked, and it’s only possible to get from the input value to the output value, not the other way round,” explains Robert Grass, a professor in the Department of Chemistry and Applied Biosciences. “Since it’s a physical system and not a digital one, it can’t be decoded by an algorithm, not even by one that runs on a quantum computer,” adds Anne Lüscher, a doctoral student in Grass’s group. She is the lead author of the paper, which was published in the journal Nature Communications.

The researchers’ new system can serve as a counterfeit-​proof way of certifying the authenticity of valuable objects such as works of art. The technology could also be used to trace raw materials and industrial products.

How it works

The new biochemical one-​way function is based on a pool of one hundred million different DNA molecules. Each of the molecules contains two segments featuring a random sequence of nucleotides: one segment for the input value and one for the output value. There are several hundred identical copies of each of these DNA molecules in the pool, and the pool can also be divided into several pools; these are identical because they contain the same random DNA molecules. The pools can be located in different places, or they can be built into objects.

Anyone in possession of this DNA pool holds the security system’s lock. The polymerase chain reaction (PCR) can be used to test a key, or input value, which takes the form of a short sequence of nucleotides. During the PCR, this key searches the pool of hundreds of millions of DNA molecules for the molecule with the matching input value, and the PCR then amplifies the output value located on the same molecule. DNA sequencing is used to make the output value readable.

At first glance, the principle seems complicated. “However, producing DNA molecules with built-​in randomness is cheap and easy,” Grass says. The production costs for a DNA pool that can be divided up in this way are less than 1 Swiss franc. Using DNA sequencing to read out the output value is more time-​consuming and expensive, but many biology laboratories already possess the necessary equipment.

Securing valuable goods and supply chains

ETH Zurich has applied for a patent on this new technology. The researchers now want to optimise and refine it to bring it to market. Because using the method calls for specialised laboratory infrastructure, the scientists think the most likely application for this form of password verification is currently for highly sensitive goods or for access to buildings with restricted access. This technology won’t be an option for the broader public to check passwords until DNA sequencing in particular becomes easier.

A little more thought has already gone into the idea of using the technology for the forgery-​proof certification of works of art. For instance, if there are ten copies of a picture, the artist can mark them all with the DNA pool – perhaps by mixing the DNA into the paint, spraying it onto the picture or applying it to a specific spot.

If several owners later wish to have the authenticity of these artworks confirmed, they can get together, agree on a key (i.e. an input value) and carry out the DNA test. All the copies for which the test produces the same output value will have been proven genuine. The new technology could also be used to link crypto-​assets such as NFTs, which exist only in the digital world, to an object and thus to the physical world.

Furthermore, it would support counterfeit-​proof tracking along supply chains of industrial goods or raw materials. “The aviation industry, for example, has to be able to provide complete proof that it uses only original components. Our technology can guarantee traceability,” Grass says. In addition, the method could be used to label the authenticity of original medicines or cosmetics.



Journal

Nature Communications

DOI

10.1038/s41467-024-47187-7

Article Title

Chemical unclonable functions based on operable random DNA pools

Share26Tweet17
Previous Post

Preventive angioplasty does not improve prognosis

Next Post

MIT engineers design soft and flexible “skeletons” for muscle-powered robots

Related Posts

blank
Chemistry

JUNO Successfully Completes Liquid Filling and Commences Data Acquisition

August 26, 2025
blank
Chemistry

Durable and Flexible Porous Crystals Showcase Exceptional Gas Sorption Capabilities

August 25, 2025
blank
Chemistry

Rice’s Martí, Sarlah, and Wang Receive National American Chemical Society Honors

August 25, 2025
blank
Chemistry

Molecular Compound Enables Photoinduced Double Charge Accumulation

August 25, 2025
blank
Chemistry

Astronomers Chart Stellar ‘Polka Dots’ with NASA’s TESS and Kepler Missions

August 25, 2025
blank
Chemistry

Sure! Here’s a rewritten version of the headline: “Lignin Discovered in Latitude Region, Scientists Reveal” If you want it more specific or adjusted in tone, just let me know!

August 25, 2025
Next Post
Muscle Flex

MIT engineers design soft and flexible “skeletons” for muscle-powered robots

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27538 shares
    Share 11012 Tweet 6883
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    952 shares
    Share 381 Tweet 238
  • Bee body mass, pathogens and local climate influence heat tolerance

    641 shares
    Share 256 Tweet 160
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    508 shares
    Share 203 Tweet 127
  • Warm seawater speeding up melting of ‘Doomsday Glacier,’ scientists warn

    312 shares
    Share 125 Tweet 78
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • Neonatal Risks Linked to In-Utero Growth Restriction
  • JUNO Successfully Completes Liquid Filling and Commences Data Acquisition
  • Video Games Boost Well-Being During COVID-19: Meta-Analysis
  • Targeted Prostate Screening: Reducing Harm through Age Stratification

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Blog
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 4,859 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading