摘要 |
<p>PERMUTATION DATA TRANSFORM TO ENHANCE SECURITY 5 One data transformation permutes certain bits in a data input based on other bits in the data input. Another data transformation raises one segment of a data input to a power of a function of another segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result, and the transformed data assembled. In one key derivation application, a segment of the master key is hashed. Two numbers are 0 derived from another segment of the master key. A universal hash function is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key. These algorithms can be combined with each other and with key wrapping algorithms or encryption algorithms to enhance the security of 5 these other applications. ________ 5119 _ _ _ _ cC) In _ _ _ _ _ In _ _ _ _O</p> |