Exponential data transform to enhance security
First Claim
Patent Images
1. A data transformer, comprising:
- an input port to receive data including a plurality of bits;
a padder to pad said data to a predetermined number of bits;
a divider to divide said padded data into a first segment and a second segment;
a calculator to compute an exponential permutation of said padded data using said first segment, said second segment, and a predefined modulus; and
an output port to output said first segment and said exponential permutation as transformed data.
3 Assignments
0 Petitions
Accused Products
Abstract
A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
-
Citations
24 Claims
-
1. A data transformer, comprising:
-
an input port to receive data including a plurality of bits; a padder to pad said data to a predetermined number of bits; a divider to divide said padded data into a first segment and a second segment; a calculator to compute an exponential permutation of said padded data using said first segment, said second segment, and a predefined modulus; and an output port to output said first segment and said exponential permutation as transformed data. - View Dependent Claims (2, 3, 4)
-
-
5. A data security device, comprising:
-
a data transformer, including; an input port to receive data including a plurality of bits; a padder to pad said data to a predetermined number of bits; a divider to divide said padded data into a first segment and a second segment; a calculator to compute an exponential permutation of said padded data using said first segment, said second segment, and a predefined modulus, including; an implementation of a first formula to compute a power as a function of said first segment, said power being relatively prime to a function of said predefined modulus; an implementation of a second formula to compute a result of raising a function of said second segment to said power; and an implementation of a third formula to compute said exponential permutation as said result modulo said predefined modulus; and an output port to output said first segment and said exponential permutation as transformed data; and an implementation of a security algorithm to secure said transformed data. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for generating a data transform, comprising:
-
receiving data, the data including a plurality of bits; padding the data to a predetermined number of bits; dividing the padded data into a first segment and a second segment, each of the first segment and the second segment including at least one bit; computing an exponential permutation using the first segment, the second segment, and a predefined modulus; and constructing the data transform from the first segment and the exponential permutation. - View Dependent Claims (14, 15, 16)
-
-
17. A method for enhancing security of data, comprising:
-
transforming the data, including; receiving data, the data including a plurality of bits; padding the data to a predetermined number of bits; dividing the padded data into a first segment and a second segment, each of the first segment and the second segment including at least one bit; computing a power as a function of the first segment, the power being relatively prime to a function of a predefined modulus; computing a result of raising a function of the second segment to the power; computing an exponential permutation as the result modulo the predefined modulus; and constructing the data transform from the first segment and the computed exponential permutation; and applying an implementation of a security algorithm to the data transform to secure the data transform. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification