A method includes extracting, by a computing system, movement intentions of an individual from neural signals; mapping, by a secure element of the computing system, the movement intentions to a character string; and generating, by the computing system, a symmetric encryption key using the character string as an input to a key exchange protocol.