top of page

Merging security with molecular biology

Bringing the concept of a ciphercolonies to network and data protection. Imagine plugging your computer into a living or live simulant apparatus as part of your IT security

What is it?

A hardware design that integrates live and algorithmic inhabitants to produce patterns of gene expression in vivo and in silico

​

Protocols and algorithms based upon the processes of regulation of gene expression to produce cryptographic representations of genes, RNA, proteins, and gene expression to perform authentication and confidentiality functions for computers and networks

​

A network concept of operations integrating all of the above into existing legacy networks

Motivation

Conventional security protocols are becoming increasingly vulnerable due to more intensive, highly capable attacks on the underlying mathematics of cryptography.
Security protocols are being undermined by social engineering and substandard implementations by IT organizations.
Credible alternative concepts face a high barrier to entry in the IT security market due to the perceived cost and effort of implementation

​

Screenshot from 2025-03-16 04-12-18.png
bottom of page