Existing key encryption approaches are extended by using overlapping
portions of encrypted information. Another provision inserts one or more
bits of data to ensure correct encryption/decryption. The inserted data
can also be used for authentication.