Original DataHush Encryption Strategies
Description This section discusses some of the encryption strategies originally employed by DataHush. Some novel strategies remain unpublished. In general, an encryption’s strength relies upon the following: - Encryption algorithm – the ‘formula’ used to encrypt - Length of key - Processing power/time We have the following techniques that we feel make it possible to strongly secure a transmission: Dual encryption technique and compression Two strong encryptions are used. One method is based on a known published method, the other proprietary. A third layer is related in that the stream is compressed according to one of a battery of techniques. Compression is a form of encoding that effectively strengthens the encryption, since even if the decompression technique is known, it increases the burden of overhead required to break the code. Physical possession It is possible to require a proprietary hardware device. This would require physical possession of the hardware device to make a tr...