Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
Type:
Grant
Filed:
March 2, 2012
Date of Patent:
May 27, 2014
Assignee:
CMLA, LLC
Inventors:
Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
Type:
Application
Filed:
March 2, 2012
Publication date:
June 28, 2012
Applicant:
CMLA, LLC
Inventors:
Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
Abstract: Key derivation algorithms are disclosed. In one key derivation application, a segment of the master key is hashed. Two numbers of derived from another segment of the master key. A universal hash function, using the two numbers, is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key.
Type:
Grant
Filed:
June 25, 2009
Date of Patent:
April 10, 2012
Assignee:
CMLA, LLC
Inventors:
Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
Abstract: A data input is divided into two segments; the second segment is also divided into groups. Bits in the first segment are used to control the application of permutation functions to bit groups in the second segment. The transformed data is assembled from the first segment and the permuted groups of the second segment. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
Type:
Grant
Filed:
August 12, 2004
Date of Patent:
December 13, 2011
Assignee:
CMLA, LLC
Inventors:
Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
Abstract: Key derivation algorithms are disclosed. In one key derivation application, a segment of the master key is hashed. Two numbers of derived from another segment of the master key. A universal hash function, using the two numbers, is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key.
Type:
Grant
Filed:
August 12, 2004
Date of Patent:
August 18, 2009
Assignee:
CMLA, LLC
Inventors:
Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
Type:
Grant
Filed:
August 12, 2004
Date of Patent:
July 21, 2009
Assignee:
CMLA, LLC
Inventors:
Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen