Cryptography – Key management
Reexamination Certificate
2002-06-28
2010-02-09
Moazzami, Nasser G (Department: 2436)
Cryptography
Key management
C380S044000, C380S280000, C380S281000, C726S005000, C726S030000, C713S161000, C713S168000, C713S169000, C713S181000, C713S187000
Reexamination Certificate
active
07660421
ABSTRACT:
A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
REFERENCES:
patent: 4924515 (1990-05-01), Matyas et al.
patent: 4941176 (1990-07-01), Matyas et al.
patent: 5142578 (1992-08-01), Matyas et al.
patent: 5200999 (1993-04-01), Matyas et al.
patent: 5214698 (1993-05-01), Smith et al.
patent: 5265164 (1993-11-01), Matyas et al.
patent: 5363447 (1994-11-01), Rager et al.
patent: 6333983 (2001-12-01), Enichen et al.
patent: 6378072 (2002-04-01), Collins et al.
patent: 6947556 (2005-09-01), Matyas et al.
patent: 6959086 (2005-10-01), Ober et al.
patent: 7055029 (2006-05-01), Collins et al.
patent: 2002/0080958 (2002-06-01), Ober et al.
patent: 2003/0048905 (2003-03-01), Gehring et al.
Mihir Bellare et al, Keying hash functions for Message Authentication, CRYPTO, 1996.
B. Preneel, Hash functions and MAC algorithms based on block ciphers, Springer, 1997.
IBM Technical Disclosure Bulletin, Feb. 1992, TDB-ACC-No. NN9202104, pp. 1-7.
IBM Technical Disclosure Bulletin, TDB-ACC-No. NN9304107, pp. 1-5, Apr. 1993.
Coppersmith et al., IBM Research Report entitled “Triple DES Cipher Block Chaining with Output Feedback Masking”, Oct. 21, 1996, pp. 1-19, published by IBM Research Division.
“Advanced Encryption Standard”, found on Internet at http://searchsolaris.techtarget.com/sDefinition/O,,sid12—gci344759,00.html on Jun. 6, 2002.
“FIPS”, found on Advanced Encryption Standard website, http://csrc.nist.gov/encryption/aes/ on Jun. 6, 2002.
Chen Ching-Hsuan
Hines Larry
Hopkins Dale W.
Langford Susan
Abedin Shanto M
Hewlett--Packard Development Company, L.P.
Moazzami Nasser G
LandOfFree
Method and system for secure storage, transmission and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for secure storage, transmission and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for secure storage, transmission and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4171157