Does the UDPi process require an encryption algorithm to create a secure system?
UDPi does not require a secondary encryption algorithm to create a secure system. The process can be used as a stand-alone protection method or in combination with a complex encryption algorithm. If an encryption algorithm is implemented in conjunction with UDPi, the protected media is decrypted using the UDPi process at the customer end and is then decrypted using the accompanying encrypting algorithm.