Cryptography – Key management – Having particular key generator
Patent
1997-06-30
2000-11-07
Peeso, Thomas R.
Cryptography
Key management
Having particular key generator
380 47, 380257, 705 53, 705 54, H04K 900
Patent
active
061447447
ABSTRACT:
Objects such as master keys or object protection keys that are kept in a protected environment of a crypto module are securely transferred between modules by means of transport keys. The transport keys are generated by public key procedures and are inaccessible outside the modules. Master keys are encrypted under the transport key within the protected environment of the source module, transmitted in encrypted form to the target module, and decrypted with the transport key within the protected environment of the target module. Object protection keys that are encrypted under a first master key kept in the protected environment of the source module are decrypted with the first master within the protected environment of the source module before being encrypted under the transport key. The object protection keys are encrypted under a second master key within the protected environment of the target module after being decrypted with the transport key. The procedure is secure since the transport key, the master keys and the object protection keys are never made available outside the protected environments of the crypto modules.
REFERENCES:
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4755940 (1988-07-01), Brachtl et al.
patent: 5313521 (1994-05-01), Torii et al.
patent: 5572590 (1996-11-01), Chess
patent: 5796830 (1998-08-01), Johnson et al.
patent: 5850444 (1998-12-01), Rune
"Applied Cryptography" Second Edition, Protocols, Algorithms and Source Code in C, by B. Schneier, 1996, pp. 466-471.
"Efficient Methods for Two Party Entity Authentication and Key Exchange in a High Speed Environment" by E. Basturk et al., IBM Technical Disclosure Bulletin, vol. 38, No. 03, Mar. 1995.
"Message Replay Prevention Using a Previously Transmitted Random Number To Sequence The Messages" by W. C. Martin, IBM Technical Disclosure Bulletin, vol. 27, No. 3, Aug. 1984.
"Personal Verification and Message Authentication Using Personal Keys" by R. E. Lennon et al., IBM Technical Disclosure Bulletin, vol. 24, No. 12, May 1982.
"SNA Bind Security Enhancement" by R. E. Lennon et al., IBM Technical Disclosure Bulletin, vol. 26, No. 10A, Mar. 1984.
"Transaction Incrementing Message Authentication Key" by W. D. Hopkins, IBM Technical Disclosure Bulletin, vol. 26, No. 1, Jun. 1983.
D'Avignon Edward J.
DeBellis Robert S.
Smith, Sr. Ronald M.
Yeh Phil Chi-Chung
International Business Machines - Corporation
Jack Todd
Kinnaman Jr. William A.
Peeso Thomas R.
LandOfFree
Method and apparatus for the secure transfer of objects between does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for the secure transfer of objects between , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for the secure transfer of objects between will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1649311