Skip to main content
Article thumbnail
Location of Repository

And now for something completely different: looking ahead to new encryption and secrecy protocols

By Helen Ashman and Martyn Gilbert

Abstract

Transmitting sensitive data over non-secret channels has always required encryption technologies to ensure that the data arrives without exposure to eavesdroppers. The Internet has made it possible to transmit vast volumes of data more rapidly and cheaply and to a wider audience than ever before. At the same time, strong encryption makes it possible to send data securely, to digitally sign it, to prove it was sent or received, and to guarantee its integrity.\ud \ud The Internet and encryption make bulk transmission of data a commercially viable proposition. However, there are implementation challenges to solve before commercial bulk transmission becomes mainstream. Powerful have a performance cost, and may affect quality of service. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Performance degradation and potential for commercial loss discourage the bulk transmission of data over the Internet in any commercial application. This paper outlines technical solutions to these problems. We develop new technologies and combine existing ones in new and powerful ways to minimise commercial loss without compromising performance or inflating overheads

Year: 2001
OAI identifier: oai:eprints.nottingham.ac.uk:293
Provided by: Nottingham ePrints

Suggested articles

Citations

  1. (2000). CID Security Database, http://www.all.net/CID/Defense/Defense69.html (on path diversity) and http://www.all.net/CID/Defense/Defense68.html (on spread spectrum) Globalstar,
  2. (2000). Communication Method, patent pending (Amino Holdings

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.