Encoding addresses the urgent need to ensure the security of
corporate, educational and government databases, especially in
mobile or networked environments.
Depending on the data, the technology can compress a data table by
an order of magnitude or more, while also making it highly secure.
This can of course save valuable bandwidth if data are to be
transmitted securely over a communications link.
Semantic Encoding is a new technology that is fundamentally different
from all other existing database security technologies, because it is
based on a method of splitting up a relational table, rather than
encrypting the individual fields. This means that Semantic Encoding
can be used together with encryption to increase the security of a
Semantic Encoding offers several features that current database
security technologies do not:
These capabilities augment the security of encryption-based methods,
and provide the database administrator with new tools to combat key
theft and network security problems.
- While current cryptographic methods are based on mathematical
problems that are not yet known to have a solution, Semantic Encoding
is based on a mathematical problem that is known to have no solution.
- Depending on the contents, a database can be compressed by an order of magnitude or more
when it is encoded, reducing storage and transmission requirements;
- Semantic Encoding is impervious to cryptographic attack;
- If a non cryptographic method is used in an unauthorized to attempt
to decode a semantically encoded database, there is no way for an
attacker to tell, by just looking at the result, whether or not the
method has succeeded;
- A Semantic Encoding key can be very quickly changed, helping to make
key theft useless;
- Separate keys can be assigned to different authorized users;
- The database is split up into components that can easily be
distributed on a network;
Semantic Encoding can be applied to any database application. It can
be implemented very easily using SQL, and is very efficient. A large
organization can gain the most from such a general and powerful technology,
and we are interested in discussing the joint exploitation of this