Cryptography – Particular algorithmic function encoding – Public key
Reexamination Certificate
1998-09-16
2001-10-23
Peeso, Thomas R. (Department: 2132)
Cryptography
Particular algorithmic function encoding
Public key
C380S028000, C380S029000, C380S046000, C380S044000, C380S277000
Reexamination Certificate
active
06307936
ABSTRACT:
COPYRIGHT NOTICE
A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates generally to a cryptographic key management scheme, and more particularly relates to a method of creating and manipulating encryption keys without risking the security of the key.
2. Description of the Prior Art
All cryptographic techniques, whether used for encryption or digital signatures depend upon cryptographic keys. Cryptographic key management systems are a crucial aspect of providing security. Typical key management systems include key generation policies, key distribution policies and key termination policies. Cryptographic key management schemes are built on commonly used lower level concepts, such as key wrapping techniques. These techniques vary with the type of cryptographic algorithmn used and are vast in numbers. However, key management systems are unique to the developer and vary substantially depending on the type of key used and level of security required.
The key management scheme allows for efficient access to all keys so that the cryptographic algorithms can run as fast as possible and be as compact as possible, with little secure tradeoffs as possible.
OBJECT AND SUMMARY OF THE INVENTION
It is an object of the present invention to provide a comprehensive powerful and secure encryption key management scheme.
It is another object of the present invention to provide the user with a set of encryption key management rules and commands for various encryption key algorithms.
It is a farther object of the present invention to provide a method of managing the use of keys in a cryptographic co-processor.
It is still another object of the present invention to provide the user with a set of encryption key management rules that prevent the user from generating risky keys.
In accordance with one form of the present invention, a method of managing the use of keys in a cryptographic co-processor includes the steps of selecting a key type from one of a symmetrical key type and an asymmetrical key type. Then, the key bit length is selected. The key is then generated and, lastly, the key is represented in either an external form or an internal form.
The key management method allows for many different key types to be selected. Also, several key lengths may be chosen. The key may be generated in various ways to meet industry standards, and the key may be represented preferably in either an inter-operable external form or internal or external forms set up by the cryptographic co-processor manufacturer.
The key management scheme allows for a wide range of key management implementations. It is only concerned with supplying primitive key management utilities. This allows the application using the encryption key management to create either a simple flat key management structure, or a highly layered and complex military grade key management system.
REFERENCES:
patent: 4987595 (1991-01-01), Marino, Jr. et al.
patent: 5200999 (1993-04-01), Matyas et al.
patent: 5495533 (1996-02-01), Linehan et al.
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5623545 (1997-04-01), Childs et al.
patent: 5631960 (1997-05-01), Likens et al.
patent: 5721777 (1998-02-01), Blaze
patent: 5864667 (1999-08-01), Barkan
Ober Timothy
Reed Peter
Hoffmann & Baron , LLP
Jack Todd
Peeso Thomas R.
SafeNet, Inc.
LandOfFree
Cryptographic key management scheme does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic key management scheme, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic key management scheme will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2584066