A data input is divided into two segments. The second segment is raised to
a power of a function of the first segment, the power being relatively
prime to a function of a predefined modulus. The modulus is then applied
to the result. The transformed data is assembled from the first segment
and the remainder modulo the modulus. This data transformation can be
applied in combination with a key derivation algorithm, a key wrapping
algorithm, or an encryption algorithm to enhance the security of these
other applications.