Method of authentication and storage of private keys in a...

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S284000, C380S277000

Reexamination Certificate

active

06370250

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Technical Field
The present invention relates in general to electronic data transfer security and in particular to defeating private key discovery attacks in a public key cryptography system. Still more particularly, the present invention relates to providing an authentication mechanism for accessing private keys utilizing in decoding an encrypted data transfer.
2. Description of the Related Art
Security for electronic communications—e-mail, HTTP transactions, telephone communications, etc.—is essential for a variety of enterprises employing publicly shared or otherwise insecure communications channels, including Internet storefront businesses which wish to conduct electronic commerce. One of the most common techniques for providing the requisite security is encryption of data transfers utilizing a public key cryptography system (PKCS).
Public key cryptography encryption actually relies on a pair of keys: a public key and a private key. Public-key algorithms are designed so that the key used for encryption is different from the key used for decryption (i.e.—the encryption algorithm is not symmetric) and so that the decryption key cannot be readily calculated from the encryption key. Thus, one key—typically, but not necessarily, the encryption key—may be published while the corresponding key is kept secret.
In PKCS systems, the public key is generally published to the party sending the message and utilized to encrypt the message by an one-way or irreversible encryption algorithm, resulting in an encrypted message which cannot be decrypted or deciphered utilizing the public key, but only by utilizing a corresponding private key known only to the intended recipient. The encrypted message is transmitted to the intended recipient, which utilizes the private key to decrypt the message.
A common implementation of PKCS, for example, employs Rivest-Shamir-Aldeman (RSA) and Data Encryption Standard (DES) encryption. A message to be transferred is first encrypted by a one-way encryption algorithm with a random (or, more commonly, pseudo-random) DES key. The DES key is also encrypted utilizing the public key of the intended recipient, and both the encrypted message and the encrypted DES key are transmitted to the intended recipient. When the message and DES key arrive, the recipient employs the private key to decrypt the DES key, then decrypts the message using the newly-acquired DES key.
Encryption keys employed for public key cryptography are preferably random, or at least pseudo-random. Furthermore, larger encryption keys (i.e. 128 bits as opposed to 40 bits) provide greater security. As a result, private keys are not easily committed to memory by a user and instead are most commonly stored in nonvolatile storage by or for the owner, such as within a database containing public key/private key pairs.
By their nature, private keys must be protected, which means that the security of any public key cryptography system is limited by the security of the database containing private keys and by the security of the communications channel employed to retrieve information from the database. For instance, in a network computer environment where a number of users share a common user unit or “roam” among user units connected to a network, the private key database of a particular user may be maintained on the network, with private keys retrieved over the network. PKCS becomes useless if the private keys are readily available or easily intercepted in that or similar situations.
It would be desirable, therefore, to provide a mechanism for securing private keys for a public key cryptography system.
SUMMARY OF THE INVENTION
It is therefore one object of the present invention to provide an improved method and apparatus for providing electronic data transfer security.
It is another object of the present invention to provide a method and apparatus for defeating private key discovery attacks in a public key cryptography system.
It is yet another object of the present invention to provide an authentication mechanism for accessing private keys utilizing in decoding an encrypted data transfer.
The foregoing objects are achieved as is now described. Private keys for a public key cryptography system (PKCS) are protected with the hashed value of a password known only to an authorized user. The overall security of the PKCS system is thus augmented beyond the security of private key storage and communication when decrypting a message by the requirement of a password to extract the private key based on a password. Strong one-way hash functions and password strength rules may additionally improve overall security. Upon receipt of a message encrypted with the public key, both the public key and the protected private key are retrieved from key storage. Interception of this transaction is useless since the protected private key alone cannot be utilized to decrypt the received message. The user is prompted for entry of a password, and the password is verified by extracted a potential private key from the protected private key utilizing the hashed password value, encrypting an well-known message with the public key, decrypting the encrypted well-known message utilizing the potential private key, and comparing the original and decrypted well-known messages. If they match, the password is verified, and the extracted private key is employed to decrypt the received message. Signature values based on the password and/or private key may be employed to change the password or add new public key/private key pairs to the key storage. Since the password and/or private key are included, the signature value changes each time, thus guarding against replay attacks.
The above as well as additional objects, features, and advantages of the present invention will become apparent in the following detailed written description.


REFERENCES:
patent: 4633036 (1986-12-01), Hellman et al.
patent: 5005200 (1991-04-01), Fischer
patent: 5210795 (1993-05-01), Lipner et al.
patent: RE34954 (1995-05-01), Haber et al.
patent: 5659616 (1997-08-01), Sudia
patent: 5706512 (1998-01-01), Bahls et al.
patent: 5706513 (1998-01-01), Bahls et al.
patent: 5719938 (1998-02-01), Haas et al.
patent: 5818936 (1998-10-01), Mashayekhi
patent: 5870475 (1999-02-01), Allan et al.
patent: 6009174 (1999-12-01), Tatebayashi et al.
patent: 6154543 (2000-11-01), Baltzley
Schneier, “Applied Cryptography, 2ndEd.,” Section 24.5, pp. 566-571, 1996.*
Schneier, “Applied Cryptography, 2ndEd.,” Section 8.4, pp. 178-179, 1996.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of authentication and storage of private keys in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of authentication and storage of private keys in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of authentication and storage of private keys in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2886529

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.