Skip To Main Content

Toggle Close Container

Contact Nav

Mobile District Home

Translate

Schools Canvas BTN - Mobile

Form Canvas BTN - Mobile

Utility Nav Mobile

Mobile Main Nav

Header Holder

Header School Name

Toggle Menu Container

Header Right Column

Header Right Top

Contact Nav Desktop

Desktop District Home

Translate

Header Right Bottom

Schools Canvas BTN

Form Canvas BTN - Global

Utility Nav Desktop

Canvas Menus Container

Schools Canvas

Close Schools Canvas

chandler unified Schools

chandler unified Schools

Form Canvas - Global

Close Form Canvas

Information Form

Required

Supporting Text
Supporting Text
Supporting Text
Placeholder Text

Form Canvas Homepage

Close Form Canvas - Homepage

Interest Form

Required

Supporting Text
Supporting Text
Supporting Text
Placeholder Text

Breadcrumb

Abstract Traditional cryptographic secrets (keys, passwords, tokens) are static, stored separately from the user, and vulnerable to theft, loss, or coercion. This paper introduces Skeys (Somatic + Situational Keys)—a novel class of ephemeral, context-dependent secrets dynamically generated from a fusion of real-time behavioral biometrics, environmental data, and user intention modeling. Unlike conventional keys, Skeys exist only during a user’s interaction with a system and dissolve upon context change (e.g., location shift, physiological state change, or task termination). We present a mathematical model for Skey generation using recurrent neural networks over continuous sensor streams, propose a zero-knowledge proof protocol for Skey-based authentication without secret reconstruction, and analyze attack surfaces including adversarial sensor spoofing. We conclude with a proof-of-concept implementation using smartwatch PPG (heart rate), gaze tracking, and typing cadence, achieving an equal error rate of 0.03% in continuous authentication scenarios. 1. Introduction Current cryptographic systems suffer from a secret-storage paradox : secrets must be long-lived enough to be useful, yet short-lived enough to limit exposure. Passphrases are reused; hardware tokens can be stolen; biometrics (fingerprints, iris) are immutable once leaked. Skeys resolve this paradox by binding secrets to the continuous, non-repeating stream of user behavior and environment —what we call the context signature . The paper explores: (1) How can a secret be a process rather than an object? (2) Can authentication be both stateless and non-replayable? (3) What happens when we treat key generation as an emergent property of human-in-the-loop activity? 2. Definition & Properties A Skey is defined as:

Here’s a concept for a speculative, interdisciplinary paper titled: