What do coffee and cryptocurrencies have in common?

Cups of cappuccino sit on a table during the World Coffee Conference in Guatemala City February 26, 2010. Guatemala will produce less coffee than previously forecast in the 2009/10 season due to bad weather, increasing pressure on already tight global supplies, the head of the national growers group Anacafe said on Friday. REUTERS/Daniel LeClair  (GUATEMALA - Tags: SOCIETY BUSINESS) - GM1E62R0JYM01

William Gilpin sees similarities between the cryptographic hash and the swirling flow of liquids that you might see in your morning coffee. Image: REUTERS/Daniel LeClair (GUATEMALA - Tags: SOCIETY BUSINESS) - GM1E62R0JYM01

Amy Adams
Director of Science Communications, Stanford University
Share:
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale

The physics involved with stirring a liquid operate the same way as the mathematical functions that secure digital information, research shows.

In the Proceedings of the National Academy of Sciences, applied physics doctoral student William Gilpin of Stanford University describes how swirling liquids, such as coffee, follow the same principles as transactions with cryptocurrencies such as bitcoin.

This parallel between the mathematical functions governing cryptocurrencies and natural, physical processes may help in developing more advanced digital security and in understanding physical processes in nature.

“Having an actual physical model and showing that this is a naturally occurring process might open up new ways to think about those functions,” Gilpin says.

How cryptocurrency works

Cryptocurrencies like bitcoin work in mysterious ways on purpose. No central group protects or controls virtual currency. Instead, cryptocurrencies exchange and secure information through a mathematical function called a cryptographic hash—a modern workhorse for cybersecurity. These functions mathematically transform digital information into a unique output that disguises the input.

“Something as ordinary as a fluid is still performing computations. It’s not something only humans tell computers to do.”

Hash functions are deliberately complex, but they also remain consistent so that the same input always produces the same output. However, two similar inputs will likely produce very different outputs. These functions make it easy for computers to track cryptocurrencies but hard for hackers to do the same.

As a physicist, Gilpin says he saw similarities between the way hash functions work and the physical laws involved with stirring a liquid. “I figured there’s probably some analogy there that was worth looking into,” he says. And, with a few weeks free during a winter break he decided to explore his idea.

Gilpin focused on a principle called chaotic mixing, which describes the action of mixing a fluid. Imagine stirring coffee creamer into a mug of black coffee and watching the creamer separate into a swirling pattern. If you stirred the creamer precisely the same way in the future, the same pattern would result. But even the smallest change in the location of the spoon or the speed of the stir results in a very different pattern. In other words, each initial stir produces a unique swirl signature.

Additionally, just looking at the resulting pattern of the creamer in the coffee doesn’t reveal anything about the original action—where the spoon was, how fast it moved, or how many circles—similar to the way a hash function transforms information so that the input is impossible to identify.

Gilpin decided to put the chaotic-mixing-of-fluids example to the test as a hash function. He found that the equations involved in mixing a fluid fit the requirements for hash functions almost perfectly. “I wasn’t expecting it to perform that well,” he says. “When it looked like it satisfied every property of a hash function I started getting really excited. It suggests that there’s something more fundamental going on with how chaotic math is acting.”

Hash functions for drugs and security

Modern hash functions are an ongoing area of research, as cryptocurrencies and similar applications such as digital signatures are becoming increasingly common for credit card transactions and legal documents. Gilpin suspects the parallel between the fields of computer science and applied physics could help in creating even more secure ways of protecting digital information.

This connection can also help validate precise procedures, such as those used in drug development, says Gilpin. Certain drug development methods require injecting various fluids at specific points in time, similar to the way a hash function performs a precise order of equations. “If you don’t form the correct arrangement when you’re done, then you know that one of your processes didn’t go right,” he says. “The chaotic property ensures that you’re not going to accidentally get a final product that looks correct.”

The discovery also suggests that cryptographic, presumably human-devised computations are not unique to the digital realm. “Something as ordinary as a fluid is still performing computations,” says Gilpin. “It’s not something only humans tell computers to do. It’s something that nature does and it shows up in the structure of how things form.”

Gilpin isn’t a computer scientist or drug developer himself. When he’s not connecting the digital and physical fields, he studies the way fluids work in nature with Manu Prakash, an assistant professor of bioengineering. So for him, “the idea that we can start to use some of these ideas from computer science is pretty exciting.”

Funding for this work came from the US Department of Defense.

Have you read?
Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Share:
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

About Us

Events

Media

Partners & Members

  • Join Us

Language Editions

Privacy Policy & Terms of Service

© 2024 World Economic Forum