ABSTRACT

Methods of transmitting proprietary data are in demand for both civil and military applications. Transmitting proprietary data is a challenging problem for the following reasons: On the one hand, if the proprietary data were intercepted, it should not be easily deciphered by an enemy (in military applications) or by a competitor (in business applications). On the other hand, proprietary data should be successfully deciphered by their intended recipient.