Skip navigation to content

Spotlight on technologies


What is Data Encryption?

Data encryption refers to mathematical algorithms that transforms plaindata into a form that is non-recognisable to unauthorised parties. The recipient of encrypted data uses a key which triggers the algorithm mechanism to decrypt the data, transforming it back to the original version.

Before the internet, data encryption was seldom used by the public as it was more of a military security tool. With the prevalence of online shopping, banking and other telecom based services, even basic home users are now aware of data encryption.

At present, security threats existing in mobile phone networks could range from passively eavesdropping to actively stealing data from others; in other words, unauthorised access. Moreover, there are inherent security risks involved in transferring information over any network.  For those who need protection through encryption it can be a costly business.

Current telecommunications encryption techniques can be computationally expensive as they require either complex software or highly specialised hardware and some form of preliminary security-critical key distribution.  Even 'public key' systems require this.  Our low-cost data encryption method could be used in telecommunications channels where secure encryption of the data is essential i.e. in data channels where 'man-in-the-middle attacks' are prevalent.  

The 'man-in-the-middle attack' (MITM) is a form of active eavesdropping in which the MITM attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the MITM attacker. The MITM attacker is able to intercept all messages being exchanged between the two victims and inject new ones, which is straightforward in many circumstances.

A MITM attack can only be successful when the MITM attacker can impersonate each endpoint to the satisfaction of the other. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks.

Our software technology can be developed to suit any telecommunications application which requires fast but secure encryption of transmission data.  Most notably it can be used in mobile device applications, where encryption is required 'on the fly', e.g. to enhance security in mobile phone and PDA data traffic.  It can specifically assist in such applications, targeting against 'eavesdropping' and 'channel-tampering' interference in transmissions.

For further details you can download the Information Sheet from this page or contact us 















Data Encryption Image