For cryptographically processing data, data (X) and a key (K) are fed to a
cryptographic process (P), which may be a known process. In order to veil
the nature of the process (P), auxiliary values as fed to the process,
such as a supplementary key (K*), using which a supplementary process
(P*) generates the key proper (K). The combination of the original
process (P) and the supplementary process (P*) provides an unknown
process, hence, the relationship between the supplementary key (K*) and
the processed data (Y) is unknown. As a result, improved cryptographic
security results.