Ideal solution for mobile telecoms devices Low-cost system could be embodied in simple hardware logic No 'key' dissemination is involved.

About

Current telecommunications encryption techniques can be computationally expensive as they require either complex software or highly specialised hardware and some form of preliminary security-critical key distribution.  Even 'public key' systems require this. Our invention - a novel software algorithm - provides a computationally simple yet highly secure encryption technique for electronic data communication channels.  Moreover, the encryption technique may be tuned so that the degree of security increases exponentially with computational time.  The security scheme also incorporates a means of authenticating the end-user at the reception end of the transmission path.  This encryption method may be implemented in a hardware logic device, or similar, consisting of only a small number of gates. Our software technology can be developed to suit any telecommunications application which requires fast but secure encryption of transmission data.  Most notably it can be used in mobile device applications, where encryption is required 'onthe fly', e.g. to enhance security in mobile phone and PDA data traffic.  It can specifically assist in such applications, targeting against 'eavesdropping' and 'channel-tampering' interference in transmissions. IP Status: The University has filed for International Patent Application for this novel technology and the University would be pleased to discuss this technology transfer opportunity with new or established telecoms or telecoms-related companies having synergistic business interest in encryption products and systems handling secure transmission of telecommunications data.  

Key Benefits

Ideal solution for mobile telecoms devices Low-cost system could be embodied in simple hardware logic no 'key' dissemination is involved Provides a 'trade-off' between the degree of security required and the encryption duration Authenticates end-user data

Applications

Mobile Device applications where encryption is required

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations