This invention relates to data strings, and more particularly, to encrypting and embedding information in data strings.
Databases are often used to store data that is accessed by applications. As applications access and process data from a database, it may become necessary for applications to store additional information in a database. For example, a cryptographic application may need to store information about cryptographic keys in a database containing data that to be encrypted. However, it can be difficult to add additional data fields to an existing database. For example, if a database is used to store medical records for an insurance company or credit card account information for a bank, it can be impractical to alter or add database fields while the database is being accessed in the course of daily operations.
It would therefore be desirable to provide a method for embedding information in data strings stored in a database without requiring significant modifications to the database.
In accordance with the present invention, a data processing system is provided that includes applications and databases. The applications and databases handle data. The data includes data strings containing characters.
Each data string may have an associated data string type that specifies a legal set of characters for the data string. Each data string may also have a data format that specifies a subset of the legal set of characters. For example, a data string storing a number such as an identification number may use a character set of numerical characters. Such a data string may actually have a data type that allows letters and special characters in addition to numerical characters. The unused characters (letters and special characters in this example) may be used for embedding information in the data string.
Information may be embedded in a data string by recoding a data string from its original data format to a new data format that uses larger set of legal characters. The larger set of characters enables the data string to store embedded information without irreversibly obscuring the original data string contents.
Embedding information in data strings may be particularly useful when format-preserving encryption is used to encrypt data strings. Format-preserving encryption and decryption engines are provided that may be used to encrypt individual data strings without altering their original data formats. After encryption, information such as a version number for the encryption process can be embedded in an encrypted data string. This allows an encryption engine to store encryption-related information in a database without having to add data fields or make modifications to the database.
Further features of the invention, its nature and various advantages will be more apparent from the accompanying drawings and the following detailed description of the preferred embodiments.
An illustrative computing system 10 that may be used to implement data processing functions in accordance with the present invention is shown in
Computing equipment 12 may be used to support applications 16 and databases 18. In computing equipment 12 in which multiple applications run on the same computer platform, applications and databases may communicate with each other directly. If desired, applications 16 can communicate with each other and with databases 18 remotely using communications network 14. For example, an application 16 that is run on a computer in one country may access a database 18 that is located in another country or an application 16 running on one computer may use network 14 to transmit data to an application 16 that is running on another computer. Applications 16 may be any suitable applications, such as financial services applications, governmental record management applications, etc.
The data handled by the applications 16 and databases 18 of system 10 is represented digitally. The data includes strings of characters (i.e., names, addresses, account numbers, etc.). Consider, as an example, a scenario in which a credit card company maintains a database of credit card data for its customers. An illustrative database table 24 that might be associated with this type of database is shown in
The data strings that are handled in a typical data processing system have defined formats. For example, an identification number may be made up of a letter followed by two digits. The customer name field may contain 20 characters. Valid characters in the customer name field may be restricted to uppercase and lowercase letters and certain punctuation characters. The address field may contain 100 characters. Valid address field characters may be restricted to uppercase and lowercase letters, numbers, and certain punctuation characters. The social security number fields may be populated by strings of nine digits. The digits may be restricted to certain ranges and be separated by dashes.
In some cases, a data format may use a character set that is a subset of a character set allowed by a data string. For example, a data format might be a social security number data having only numerical characters, while a data string may allow numerical characters, letters, and special characters. For example, a database that is programmed in SQL (structured query language) may have data strings of type VARCHAR. Data strings of type VARCHAR can have characters that are letters, numbers, or special characters. Numerical characters are therefore a subset of the allowed VARCHAR characters. When a data string of type VARCHAR is used to store numerical characters such as social security numbers, only a subset of characters allowed by type VARCHAR will generally be needed to store the unmodified social security number data.
If a data string uses a character set (e.g., numerical characters) that is a subset of characters allowed by the data type (e.g., when using numerical characters which are a subset of the character set made up of numerical characters, letters and special characters), then the larger set of characters (e.g., numerical characters, letters, and special characters) may be used to represent the data string when embedding information in the data string. The embedded information may be any information added to the content of a data string in addition to its original data. Original data may be, e.g., social security numbers, license numbers, account information, or any data originally stored in a data string. A data string that has been processed so that it contains both its original data and embedded data may be referred to as an augmented data string.
The processes involved in embedding information in data strings by data string augmentation may be performed by computing equipment 12 and applications 16 in system 10 (see, e.g.,
An application 16 that embeds information in a data string may later retrieve the information from the augmented data string. For example, an application 16 that accesses a database 18 may generate information that is associated with individual data strings in the database 18. It may be difficult or inconvenient to add fields or otherwise modify database 18 to customize database 18 to each application 16. In such cases, it would be useful to be able to embed information in data strings. An application 16 may also embed information that is later retrieved by a different application 16.
The process of embedding information in data strings may be used in conjunction with format-preserving encryption. Format-preserving encryption can encrypt individual data strings so that encrypted data strings have the same data format as the original data strings. For example, a social security number data string may have a data format of nine numerical characters with two dashes interposed between the numerical characters. Format-preserving encryption may produce an encrypted data string with the same data format (i.e. nine numerical characters with two interposed dashes). A credit card number may have groups of four numerical characters separated by spaces. Format-preserving encryption may produce an encrypted credit card number data string with groups of four numerical characters separated by spaces. A license plate number may have a format of a number, three letters, and four numbers such as “3WIG892”. Format-preserving encryption may produce an encrypted license plate number with the same sequence of letters and characters. Format-preserving encryption enables an encrypted data string to be stored in the same data field of a database as the original data string. Format-preserving encryption may be performed prior to embedding information in data strings via data string augmentation. Format-preserving encryption may also be performed together with data string augmentation. Unencrypted data strings are sometimes referred to as plaintext.
To support encryption and decryption operations in system 10, applications 16 may be provided with encryption and decryption engines (see, e.g.,
Any suitable technique may be used to provide applications 16 with encryption and decryption capabilities. For example, the encryption and decryption engines may be incorporated into the software code of applications 16, may be provided as stand-alone applications that are invoked from within a calling application, or may be implemented using a distributed arrangement in which engine components are distributed across multiple applications and/or locations.
As shown in
Encryption and decryption engines in system 10 may be implemented using format-preserving cryptographic systems. These cryptographic engines are able to encrypt and decrypt strings without changing a string's format. The ability to preserve the format of a data string may greatly simplify system operations and may allow systems with legacy applications to be provided with cryptographic capabilities that would not be possible using conventional techniques. The ability to preserve a format of a data string may also allow encryption and decryption to be performed when embedding information in data strings.
Encryption engine 20 and decryption engine 22 may be called by an application or may be part of an application 16 that is running on data processing system 10. Encryption and decryption engines 20 and 22 may be part of an application 16 that performs data string augmentation. Encryption and decryption engines 20 and 22 may also be part of an application 16 that is different from an application 16 that performs data string augmentation. Data string augmentation may also be performed by encryption and decryption engines 20 and 22.
An example of embedding information in a data string is shown in
The character set used by data string 26 has only numerical characters 0-9. This character set may sometimes be referred to as the original character set of data string 26. Data string 26 may represented using a type of string that allows numerical characters, letter characters, and special characters. The original character set of data string 26 would then be a subset of a larger character set that is allowed by the string type.
If desired, an optional encryption operation or other transformation (step 28) may be performed on data string 26 to produce data string 30. If encryption is performed, format-preserving encryption can be used to produce an encrypted string 30 that has the same number of characters and that uses the same character set as the original data string 26. As shown in the example of
In step 32, information is embedded in the data string to produce augmented string 34. In the example of
The letter character (i.e., “F” in this example) may serve to encode the embedded information. An example of a code that may be used is shown in
If the encryption operation of steps 28 and 30 is omitted, information embedding may be performed directly on data string 26.
In step 31 of
In the example of
Encrypting and data string augmentation of
In the example of
Data string 36 has an original character set of numerical characters 0-9. Data string 36 may be represented using a string type that permits letter characters in addition to numerical characters, or data string 36 may have a string type that allows letter characters and special characters in addition to numerical characters.
Data string 36 may be encrypted or otherwise transformed in step 38, producing data string 40. If encryption is performed in step 38, format-preserving encryption techniques may be used to preserve the number of characters and the original character set of data string 36.
Information may be embedded in the data string in step 42 via data string augmentation. The table of
In step 43 of
In the examples of
In step 90, the embedded information may be extracted and the string restored to its original character set by using the same character map that was used in step 88.
Another strategy for embedding information is shown in the example of
Data string 50 uses a character set that has numerical characters 0-9. Data string 50 may therefore be said to be encoded with a base 10 character set. Data string 50 may be recoded into a higher base by using a larger character set. For example a larger character set that includes upper case letters and numbers will have 36 characters (10 numbers+26 letters). In step 52, data string 50 may be recoded into base 36 using this larger character set and may take the form of string 54. The characters of string 54 in
Base 36 is used in this example, but other characters sets with different bases may also be used. For example, a character set may consist of only letters, or uppercase and lowercase letters, or letters and special characters, or other suitable character sets. As another example, base 34 may be used for a character set containing 10 numbers and 24 letters, in which letters “O” and “I” are omitted as they are easily mistaken for the numbers “0” and “1.” Character sets of larger sizes will have larger bases.
The length of string 54 is six characters as compared to the nine characters of string 50. String 54 has therefore been “shortened” or “shrunk” by recoding in a character set that is larger than the original character set. If a base larger than base 36 is used, string 54 may be less than six characters in length. If a base smaller than base 36 is used, string 54 may be greater than six characters in length. Preferably, a character set and base should be chosen such that the length of string 54 is less than the length of string 50 as this provides space for embedding information in the string.
The encryption operation of step 48 may be length preserving so that encrypted data string 50 has the same length as data string 46. The encryption of step 48 may also produce an encrypted string that is longer than data string 46, as long as the recoding of step 52 produces a recoded data string 54 that is of appropriate length (e.g., a length that is shorter than data string 46).
The shrinking of data string 54 in
The example of
Data strings that use more than one character set may also be augmented. For example, a license plate number may have a defined format such a number, followed by three letters, followed by three numbers (“5ANY728”). In such a case, the numerical characters are represented in base 10 whereas the letter characters are represented in base 26. Such a data string may be recoded using a higher base or a mixture of higher bases. For example, the data string may be recoded using a base 36 character set (letters and numbers) or a base 26 character set (letters), either of which would be larger than the mixture of base 26 and base 10 used in the original character set.
In step 96, information may be embedded by adding additional characters to produce an augmented string that has the same number of characters as the original string. Because the length of the string is unchanged and because the expanded character set can be handled by the applications in system 10, it is possible to embed information in the data string via data string augmentation without giving rise to significant incompatibilities.
Box 98 of
In step 102, the string may be recoded into the original character set to produce the original data string. The recoding may be analogous to converting a number from a higher base to a lower base.
Encryption engine 20 (see, e.g.,
The encryption and decryption engines 20 and 22 may use index mappings to relate possible character values in a given string position to corresponding index values in an index. By mapping string characters to and from a corresponding index, the encryption and decryption engines 20 and 22 are able to perform encryption and decryption while preserving string formatting.
At step 60 of
At step 62, the encryption engine 20 encrypts the encoded string using a format-preserving cipher. Any suitable cryptographic formulation may be used, provided that the cryptographic strength of the encryption algorithm is sufficiently strong. With one suitable approach, encryption engine 20 and decryption engine 22 use a cryptographic algorithm based on the well known Feistel construction. The Feistel construction uses pseudo-random functions to produce a pseudo-random permutation (also sometimes referred to as a cipher or a block cipher). The Feistel construction may use one or more cryptographic keys.
At step 64, the same index mappings that were used during the encoding operations of step 60 are used to convert the index values of the encrypted string back into characters. Decoding the encoded version of the string using the index mappings returns the string to its original character set.
Illustrative steps involved in using decryption engine 22 to decrypt a string that has been encrypted using the process of
At step 66, the decryption engine 20 uses the index mappings that were used during the encryption operations of
At step 68, the encoded version of the encrypted string is decrypted. The decryption engine 22 decrypts the string using the format-preserving cipher that was used in step 62 of
At step 70, the index mappings that were used during the encoding operations of step 66 are used to convert the index values of the decrypted string back into their associated characters (i.e., characters in the legal set of character values that were defined for each character position at step 54). This returns the decrypted string to its original character set. In strings that contain more than one different type of character, multiple different index mappings are used.
By incorporating format-preserving encryption and decryption engines 20 and 22 into data processing system 10, legacy applications and databases and other applications and databases can be provided with cryptographic capabilities without disrupting their normal operation.
Data strings may be strings that are retrieved from and stored in fields in a database 18 (e.g., a table of the type shown in
In step 72, a data string is obtained. If desired, the data string may be processed to select relevant characters. For example, if the string is a social security number that contains nine digits separated by two dashes, the string can be processed to remove the dashes.
As another example, if the string being processed is a credit card number containing 16 digits and three spaces, the spaces can be removed.
At step 74, an optional transformation such as an encryption operation may be performed as described in connection with
At step 76, information may be embedded by using characters that are not in the original character set to produce an augmented string. Information embedding operations may be performed as described in connection with step 88 of
At step 78 of
At step 80, the decryption engine obtains the augmented string. The encrypted string may be retrieved from a database 18 or received from an application 16. During step 80, the encrypted string is processed to identify relevant characters. During step 80, dashes, spaces, and other extraneous elements can also be removed from the string. The relevant characters in the string are retained. The process of removing extraneous characters during step 80 is the same as that used during the processing of the original string that was performed during step 72 of
At step 82, embedded information may be extracted from the augmented string. Extracting operations may be performed as described in connection with step 90 of
At step 84 of
At step 86 of
Cryptographic keys that are used in the encrypting step 62 of
In the example of
Information embedding operations may also be performed when a data string is in an encoded form.
In step 104 of
In step 106 of
In step 108 of
As an example of how information may be embedded in an encoded string, consider a data string that is a nine digit social security number. Such a data string has an original data set of numerical characters (base 10). The largest value of a nine-digit base-10 number is 999,999,999, which corresponds to 3B9AC9FF (hex) when converted to hex (base 16). Consider a larger character set containing 10 numbers and 26 letters and having base 36. The maximum value of a data string with nine characters in base 36 would correspond to 5C5E4523FFFF (hex).
A nine-digit social security number that is converted to hex and encrypted with a format-preserving cipher, might have a value of 2A94C508 (hex), for example. Four zeros may be added to the hex number to produce 2A94C5080000 (hex). This is still a valid number as it is smaller than the maximum number in the larger character set (i.e., it is smaller than 5C5E4523FFFF). The four characters at the end of 2A94C5080000 (hex) may then be used to encode embedded information. For key 27 (key 1B in hex), an augmented string in this example might be 2A94C508001B (hex).
In step 110 of
Steps 104, 106, 108, and 110 of
The foregoing is merely illustrative of the principles of this invention and various modifications can be made by those skilled in the art without departing from the scope and spirit of the invention.
Number | Name | Date | Kind |
---|---|---|---|
5499293 | Behram et al. | Mar 1996 | A |
6836765 | Sussman | Dec 2004 | B1 |
6885748 | Wang | Apr 2005 | B1 |
7418098 | Mattsson et al. | Aug 2008 | B1 |
7567934 | Flitcroft et al. | Jul 2009 | B2 |
7665015 | Dignum et al. | Feb 2010 | B2 |
7738717 | Palmer et al. | Jun 2010 | B1 |
8355982 | Hazel et al. | Jan 2013 | B2 |
20030028481 | Flitcroft et al. | Feb 2003 | A1 |
20030191719 | Ginter et al. | Oct 2003 | A1 |
20050132070 | Redlich et al. | Jun 2005 | A1 |
20080170693 | Spies et al. | Jul 2008 | A1 |
20090048953 | Hazel et al. | Feb 2009 | A1 |
20090060199 | von Mueller et al. | Mar 2009 | A1 |
20090070583 | von Mueller et al. | Mar 2009 | A1 |
20090310778 | Mueller et al. | Dec 2009 | A1 |
20100246813 | Morris et al. | Sep 2010 | A1 |
20110211689 | von Mueller et al. | Sep 2011 | A1 |
20130198525 | Spies et al. | Aug 2013 | A1 |
20130254117 | von Mueller et al. | Sep 2013 | A1 |
Number | Date | Country |
---|---|---|
1 209 550 | May 2002 | EP |
1 906 336 | Apr 2008 | EP |
1 909 212 | Apr 2008 | EP |
2006107777 | Oct 2006 | WO |
Entry |
---|
Terence Spies, “Format Preserving Encryption,” Jul. 4, 2009, pp. 1-8. |
Mihir Bellare et al., “Format-Preserving Encryption,” Selected Area in Cryptography, Lecture Notes in Computer Science vol. 5867, 2009, pp. 259-312. |
Pauker, Mathew J. et. al, U.S. Appl. No. 11/635,756, filed Dec. 6, 2006. |
Brightwell, Michael et al., “Using Datatype-Preserving Encryption to Enhance Data Warehouse Security,” 20th National Information Systems Security Conference, Oct. 7-10, 1997—Baltimore, Maryland. |
Black, John et al. “Ciphers with Arbitrary Finite Domains,” RSA Conference 2002, San Jose, CA, USA, Feb. 18-22, 2002, Proceedings, “Lecture Notes in Computer Science,” 2271 Springer 2002, ISBN 3-540-43224-8, pp. 114-130. |
Pauker, Matthew J. et al. U.S. Appl. No. 12/432,258, filed Apr. 29, 2009. |
Martin, Luther W. et al. U.S. Appl. No. 12/610,221, filed Oct. 30, 2009. |
Thomas Stutz and Andreas Uhl, “On Format-Compliant Iterative Encryption of JPEG2000,” Proceedings of the Eighth IEEE International Symposium on Multimedia (ISM '06), 2006. |
J. Black and P. Rogaway, “Ciphers with Arbitrary Finite Domains,” [online]. Feb. 12, 2001 <URL:eprint.iacr.org/2001/012.ps>. |
Number | Date | Country | |
---|---|---|---|
20100284532 A1 | Nov 2010 | US |