Permutation data transform to enhance security
First Claim
Patent Images
1. A data transformer, comprising:
- an input port to receive data;
a divider to divide said data into a first segment and a second segment and to divide said second segment into at least one group;
a permuter including an implementation of a permutation function to permute at least one of said groups into a permuted group according to a corresponding bit in said first segment; and
an output port to output said first segment and at least said permuted group as transformed data.
3 Assignments
0 Petitions
Accused Products
Abstract
A data input is divided into two segments; the second segment is also divided into groups. Bits in the first segment are used to control the application of permutation functions to bit groups in the second segment. The transformed data is assembled from the first segment and the permuted groups of the second segment. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
65 Citations
41 Claims
-
1. A data transformer, comprising:
-
an input port to receive data;
a divider to divide said data into a first segment and a second segment and to divide said second segment into at least one group;
a permuter including an implementation of a permutation function to permute at least one of said groups into a permuted group according to a corresponding bit in said first segment; and
an output port to output said first segment and at least said permuted group as transformed data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A data security device, comprising:
-
a data transformer, including;
an input port to receive data;
a divider to divide said data into a first segment and a second segment and to divide said second segment into at least two groups, each group having a predefined size, so that a number of groups in said second segment equals a number of bits in said first segment;
a permuter including an implementation of a permutation function to permute at least one of said groups into a permuted group according to a corresponding bit in said first segment; and
an output port to output said first segment and at least said permuted group as transformed data; and
an implementation of a security algorithm to secure said transformed data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for generating a data transform, comprising:
-
receiving data;
dividing the data into a first segment and a second segment, each of the first segment and the second segment including at least one bit;
organizing the bits in the second segment into at least one group;
associating each of the groups with a bit in the first segment;
applying a permutation function to at least one of the groups according to the associated bit in the first segment; and
constructing the data transform from the first segment and at least the permuted groups. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for enhancing security of data, comprising:
-
transforming the data, including;
receiving the data;
dividing the data into a first segment and a second segment, each of the first segment and the second segment including at least one bit;
organizing the bits in the second segment into a number of groups, the number of groups equal to a number of bits in the first segment;
associating each of the groups with a bit in the first segment;
applying a permutation function to at least one of the groups according to the associated bit in the first segment; and
constructing the data transform from the first segment and at least the permuted groups; and
applying an implementation of a security algorithm to the data transform to secure the data transform. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
Specification