Non-Symbolic Fragmentation
This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do not necessarily coincide with the boundaries o...
| Main Authors: | , , , , |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2002
|
| Online Access: | https://eprints.nottingham.ac.uk/295/ |
| _version_ | 1848790388569014272 |
|---|---|
| author | Ashman, Helen Coupe, Henry Smith, Phil Neville-Smith, Martin Gilbert, Martyn |
| author_facet | Ashman, Helen Coupe, Henry Smith, Phil Neville-Smith, Martin Gilbert, Martyn |
| author_sort | Ashman, Helen |
| building | Nottingham Research Data Repository |
| collection | Online Access |
| description | This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do not necessarily coincide with the boundaries of the symbols making up the data. For example, ASCII data is broken up into fragments which may include 8-bit fragments but also include many other sized fragments. Fragments are then separated with a form of path diversity. The secrecy of the transmission relies on the secrecy of one or more of a number of things: the ordering of the fragments, the sizes of the fragments, and the use of path diversity. Once NSF is in place, it can help secure many forms of communication, and is useful for exchanging sensitive information, and for commercial transactions. A sample implementation is described with an evaluation of the technology. |
| first_indexed | 2025-11-14T18:11:49Z |
| format | Conference or Workshop Item |
| id | nottingham-295 |
| institution | University of Nottingham Malaysia Campus |
| institution_category | Local University |
| last_indexed | 2025-11-14T18:11:49Z |
| publishDate | 2002 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | nottingham-2952020-05-04T20:32:17Z https://eprints.nottingham.ac.uk/295/ Non-Symbolic Fragmentation Ashman, Helen Coupe, Henry Smith, Phil Neville-Smith, Martin Gilbert, Martyn This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do not necessarily coincide with the boundaries of the symbols making up the data. For example, ASCII data is broken up into fragments which may include 8-bit fragments but also include many other sized fragments. Fragments are then separated with a form of path diversity. The secrecy of the transmission relies on the secrecy of one or more of a number of things: the ordering of the fragments, the sizes of the fragments, and the use of path diversity. Once NSF is in place, it can help secure many forms of communication, and is useful for exchanging sensitive information, and for commercial transactions. A sample implementation is described with an evaluation of the technology. 2002 Conference or Workshop Item PeerReviewed Ashman, Helen, Coupe, Henry, Smith, Phil, Neville-Smith, Martin and Gilbert, Martyn (2002) Non-Symbolic Fragmentation. In: IEEE Internatioanl Conference on Internet Technology and Applications, November 2002, Bathurst, Australia. |
| spellingShingle | Ashman, Helen Coupe, Henry Smith, Phil Neville-Smith, Martin Gilbert, Martyn Non-Symbolic Fragmentation |
| title | Non-Symbolic Fragmentation |
| title_full | Non-Symbolic Fragmentation |
| title_fullStr | Non-Symbolic Fragmentation |
| title_full_unstemmed | Non-Symbolic Fragmentation |
| title_short | Non-Symbolic Fragmentation |
| title_sort | non-symbolic fragmentation |
| url | https://eprints.nottingham.ac.uk/295/ |