The physics involved with stirring a liquid operate the same way as the mathematical functions that secure digital information, research shows.
In the Proceedings of the National Academy of Sciences, applied physics doctoral student William Gilpin of Stanford University describes how swirling liquids, such as coffee, follow the same principles as transactions with cryptocurrencies such as bitcoin.
This parallel between the mathematical functions governing cryptocurrencies and natural, physical processes may help in developing more advanced digital security and in understanding physical processes in nature.
Hayden Capital's performance update for the second quarter ended June 30, 2022. Q2 2021 hedge fund letters, conferences and more Dear Partners and Friends, The markets continued to sell-off in the second quarter, especially for internet-based businesses. This year continues to be the toughest stretch for us, since the Hayden’s inception. Inflation concerns and the Read More
“Having an actual physical model and showing that this is a naturally occurring process might open up new ways to think about those functions,” Gilpin says.
How cryptocurrency works
Cryptocurrencies like bitcoin work in mysterious ways on purpose. No central group protects or controls virtual currency. Instead, cryptocurrencies exchange and secure information through a mathematical function called a cryptographic hash—a modern workhorse for cybersecurity. These functions mathematically transform digital information into a unique output that disguises the input.
“Something as ordinary as a fluid is still performing computations. It’s not something only humans tell computers to do.”
Hash functions are deliberately complex, but they also remain consistent so that the same input always produces the same output. However, two similar inputs will likely produce very different outputs. These functions make it easy for computers to track cryptocurrencies but hard for hackers to do the same.
As a physicist, Gilpin says he saw similarities between the way hash functions work and the physical laws involved with stirring a liquid. “I figured there’s probably some analogy there that was worth looking into,” he says. And, with a few weeks free during a winter break he decided to explore his idea.
Gilpin focused on a principle called chaotic mixing, which describes the action of mixing a fluid. Imagine stirring coffee creamer into a mug of black coffee and watching the creamer separate into a swirling pattern. If you stirred the creamer precisely the same way in the future, the same pattern would result. But even the smallest change in the location of the spoon or the speed of the stir results in a very different pattern. In other words, each initial stir produces a unique swirl signature.
Additionally, just looking at the resulting pattern of the creamer in the coffee doesn’t reveal anything about the original action—where the spoon was, how fast it moved, or how many circles—similar to the way a hash function transforms information so that the input is impossible to identify.
Gilpin decided to put the chaotic-mixing-of-fluids example to the test as a hash function. He found that the equations involved in mixing a fluid fit the requirements for hash functions almost perfectly. “I wasn’t expecting it to perform that well,” he says. “When it looked like it satisfied every property of a hash function I started getting really excited. It suggests that there’s something more fundamental going on with how chaotic math is acting.”
Hash functions for drugs and security
Modern hash functions are an ongoing area of research, as cryptocurrencies and similar applications such as digital signatures are becoming increasingly common for credit card transactions and legal documents. Gilpin suspects the parallel between the fields of computer science and applied physics could help in creating even more secure ways of protecting digital information.
This connection can also help validate precise procedures, such as those used in drug development, says Gilpin. Certain drug development methods require injecting various fluids at specific points in time, similar to the way a hash function performs a precise order of equations. “If you don’t form the correct arrangement when you’re done, then you know that one of your processes didn’t go right,” he says. “The chaotic property ensures that you’re not going to accidentally get a final product that looks correct.”
The discovery also suggests that cryptographic, presumably human-devised computations are not unique to the digital realm. “Something as ordinary as a fluid is still performing computations,” says Gilpin. “It’s not something only humans tell computers to do. It’s something that nature does and it shows up in the structure of how things form.”
Gilpin isn’t a computer scientist or drug developer himself. When he’s not connecting the digital and physical fields, he studies the way fluids work in nature with Manu Prakash, an assistant professor of bioengineering. So for him, “the idea that we can start to use some of these ideas from computer science is pretty exciting.”
Funding for this work came from the US Department of Defense.
Source: Kimberly Hickok for Stanford University