Skip to main content
Article thumbnail
Location of Repository

Non-Symbolic Fragmentation

By Helen Ashman, Henry Coupe, Phil Smith, Martin Neville-Smith and Martyn Gilbert


This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do not necessarily coincide with the boundaries of the symbols making up the data. For example, ASCII data is broken up into fragments which may include 8-bit fragments but also include many other sized fragments. Fragments are then separated with a form of path diversity. The secrecy of the transmission relies on the secrecy of one or more of a number of things: the ordering of the fragments, the sizes of the fragments, and the use of path diversity. Once NSF is in place, it can help secure many forms of communication, and is useful for exchanging sensitive information, and for commercial transactions. A sample implementation is described with an evaluation of the technology

Year: 2002
OAI identifier:
Provided by: Nottingham ePrints

Suggested articles

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.