Non-Symbolic Fragmentation

This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do not necessarily coincide with the boundaries o...

Full description

Bibliographic Details
Main Authors: Ashman, Helen, Coupe, Henry, Smith, Phil, Neville-Smith, Martin, Gilbert, Martyn
Format: Conference or Workshop Item
Published: 2002
Online Access:https://eprints.nottingham.ac.uk/295/
_version_ 1848790388569014272
author Ashman, Helen
Coupe, Henry
Smith, Phil
Neville-Smith, Martin
Gilbert, Martyn
author_facet Ashman, Helen
Coupe, Henry
Smith, Phil
Neville-Smith, Martin
Gilbert, Martyn
author_sort Ashman, Helen
building Nottingham Research Data Repository
collection Online Access
description This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do not necessarily coincide with the boundaries of the symbols making up the data. For example, ASCII data is broken up into fragments which may include 8-bit fragments but also include many other sized fragments. Fragments are then separated with a form of path diversity. The secrecy of the transmission relies on the secrecy of one or more of a number of things: the ordering of the fragments, the sizes of the fragments, and the use of path diversity. Once NSF is in place, it can help secure many forms of communication, and is useful for exchanging sensitive information, and for commercial transactions. A sample implementation is described with an evaluation of the technology.
first_indexed 2025-11-14T18:11:49Z
format Conference or Workshop Item
id nottingham-295
institution University of Nottingham Malaysia Campus
institution_category Local University
last_indexed 2025-11-14T18:11:49Z
publishDate 2002
recordtype eprints
repository_type Digital Repository
spelling nottingham-2952020-05-04T20:32:17Z https://eprints.nottingham.ac.uk/295/ Non-Symbolic Fragmentation Ashman, Helen Coupe, Henry Smith, Phil Neville-Smith, Martin Gilbert, Martyn This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do not necessarily coincide with the boundaries of the symbols making up the data. For example, ASCII data is broken up into fragments which may include 8-bit fragments but also include many other sized fragments. Fragments are then separated with a form of path diversity. The secrecy of the transmission relies on the secrecy of one or more of a number of things: the ordering of the fragments, the sizes of the fragments, and the use of path diversity. Once NSF is in place, it can help secure many forms of communication, and is useful for exchanging sensitive information, and for commercial transactions. A sample implementation is described with an evaluation of the technology. 2002 Conference or Workshop Item PeerReviewed Ashman, Helen, Coupe, Henry, Smith, Phil, Neville-Smith, Martin and Gilbert, Martyn (2002) Non-Symbolic Fragmentation. In: IEEE Internatioanl Conference on Internet Technology and Applications, November 2002, Bathurst, Australia.
spellingShingle Ashman, Helen
Coupe, Henry
Smith, Phil
Neville-Smith, Martin
Gilbert, Martyn
Non-Symbolic Fragmentation
title Non-Symbolic Fragmentation
title_full Non-Symbolic Fragmentation
title_fullStr Non-Symbolic Fragmentation
title_full_unstemmed Non-Symbolic Fragmentation
title_short Non-Symbolic Fragmentation
title_sort non-symbolic fragmentation
url https://eprints.nottingham.ac.uk/295/