Tech

Secure encryption and decryption with luminescent perovskites

Share
Share
Secure encryption and decryption with luminescent perovskites
Credit: Angewandte Chemie International Edition (2025). DOI: 10.1002/anie.202504327

To guarantee high data security, encryption must be unbreakable while the data remains rapidly and easily readable. A novel strategy for optical encryption/decryption of information has now been introduced in the journal Angewandte Chemie by a Chinese research team. It is based on compounds with carefully modulated luminescent properties that change in response to external stimuli.

The compounds are hybrid two-dimensional organic-inorganic metal-halide perovskites, whose structure consists of inorganic layers formed from lead and iodide ions (linked PbI6 octahedra) with organic cations arranged between them. They are easy to produce, inexpensive, and printable, while demonstrating interesting optoelectronic properties.

A team led by Shenlong Jiang, Qun Zhang, and Yi Luo at the University of Science and Technology of China (Hefei) worked with three perovskites with only slight variations in their cations (phenethylammonium lead iodide perovskite (PEA)2PbI4 and its fluoridated (2-F-PEA)2PbI4 and brominated (4-Br-PEA)2PbI4 derivatives).

The small differences between these perovskites result in crucial variation in their luminescent properties. At room temperature and under normal light they cannot be differentiated visually. However, they react differently to stimuli.

Data encryption with these compounds could look like this example: a “code dictionary” is generated, in which every letter of the alphabet is coded and printed as a matrix of 2×2 dots in a specific arrangement of the three different perovskites. This arrangement allows for about 1047 possible random variants, too many for the encryption to be cracked by even the fastest supercomputer.

Decryption of the information requires a combination of three different “keys”: these entail measurement of the luminescence of the individual dot patterns 1) under UV light, 2) upon cooling with liquid nitrogen, and 3) under narrow-bandpass filtering (only a small range of wavelengths is allowed through the filter).







Credit: Angewandte Chemie International Edition (2025). DOI: 10.1002/anie.202504327

Under simultaneous application of keys 1 and 2 (UV light and cooling), dots made of perovskites 1 and 2 glow green and perovskite 3 is yellow. If key 3 (the filter) is applied, dots made of perovskites 1 and 3 both appear green, dots of perovskite 2 become invisible. An adequate application of the three keys enables the decryption of the correct pattern, and can then be translated back using the code dictionary.

Alternatively, letters and other symbols can be converted into ASCII codes (8-bit patterns) and encrypted in the form of 2-bit codes. To do this, the four possible combinations of 0 and 1 (00, 01, 10, 11) are encrypted as randomly chosen 3×3 dot matrices. The true patterns are hidden among a large number of false, unassignable patterns. Decryption again uses the three keys.

The false dot patterns can efficiently be removed by computer and the remaining 2-bit codes assembled into 8-bit ASCII codes, which can be translated back into symbols.

This method based on different luminescent perovskites in combination with the facile implementation of the triple keys and the dot matrix patterns opens new possibilities for improved data security with rapid, efficient decryption.

More information:
Ziang Chen et al, High‐Security and High‐Efficiency Information Encryption/Decryption Based on 2D Hybrid Organic–Inorganic Perovskites via Delicate Organic‐Cation Engineering, Angewandte Chemie International Edition (2025). DOI: 10.1002/anie.202504327

Citation:
Secure encryption and decryption with luminescent perovskites (2025, May 27)
retrieved 27 May 2025
from

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
E-bikes and e-scooters are popular—but dangerous. A transport expert explains how to make them safer
Tech

E-bikes and e-scooters are popular—but dangerous. A transport expert explains how to make them safer

Credit: Unsplash/CC0 Public Domain Last weekend a pedestrian in Perth tragically died...

Expand your Mac mini M4 with this sleek dock offering ports, cooling and up to 16TB storage
Tech

Expand your Mac mini M4 with this sleek dock offering ports, cooling and up to 16TB storage

Beelink Mate adds ports and storage without changing your Mac mini’s footprint...