Cryptography – Communication system using cryptography – Symmetric key cryptography
Reexamination Certificate
2001-07-02
2003-11-25
Decady, Albert (Department: 2132)
Cryptography
Communication system using cryptography
Symmetric key cryptography
C380S286000, C380S044000, C713S176000
Reexamination Certificate
active
06654465
ABSTRACT:
COPYRIGHT NOTICE
A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates generally to a method of encryption key recovery on an integrated circuit, and more particularly relates to a method of establishing a trusted key relationship with an authorized party which allows a user to recover an encryption key in a secure manner.
2. Description of the Prior Art
Key recovery is typically used to retrieve a copy of a private key when the key is lost, or is unknown to an employer, or when a court order has granted a government agency the right to monitor communication traffic. A lost key results in lost data because without the key, the encrypted data cannot be decrypted. A disk holding the key may be lost or a hardware failure may result in a lost key. A user needs to have the ability to recover a lost key. An employer may need to recover private keys generated by former or disgruntled employees to retrieve corporate information. A government authority may need a private key to observe an encrypted data transmission when there is a suspicion of criminal activity. The typical method of key recovery includes sending a wrapped copy of the private key with each transmission. Then under the appropriate circumstances, this key may be unwrapped with a recovery key.
OBJECTS AND SUMMARY OF THE INVENTION
It is an object of the present invention to provide a method of creating a recovery key encryption key (RKEK) in a secure manner so that only an authorized party can own the RKEK.
It is another object of the present invention to create an RKEK for wrapping keys used in an encryption process, and for recovering the encryption key and decrypting data at a later date.
In accordance with one form of the present invention, a method of generating a recovery key encryption key (RKEK) in a secure manner by an integrated circuit (IC) and a key recovery escrow agent includes the steps of generating by the IC a first number having a private component and a public component, and generating by the escrow agent a second number having a private component and a public component. The method further includes the steps of providing the public component of the first number to the escrow agent, and providing the public component of the second number to the IC.
Then, a Diffie-Hellman modulo-exponentiation mathematical operation is performed by the IC using the private component of the first number, and the public component of the second number to create the RKEK. Also, the escrow agent performs a similar operation, that is, a Diffie-Hellman modulo-exponentiation mathematical operation using the private component of the second number, and the public component of the first number to create the RKEK at its end.
These and other objects, features and advantages of the present invention will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawing.
REFERENCES:
patent: 4987595 (1991-01-01), Marino, Jr. et al.
patent: 5448045 (1995-09-01), Clark
patent: 5539828 (1996-07-01), Davis
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5623545 (1997-04-01), Childs et al.
patent: 5631960 (1997-05-01), Likens et al.
patent: 5721777 (1998-02-01), Blaze
patent: 5857022 (1999-01-01), Sudia
patent: 6278782 (2001-08-01), Ober et al.
Ober Timothy
Reed Peter
Bodner Gerald T.
De'cady Albert
Jack Todd M
SafeNet, Inc.
LandOfFree
Method of implementing a key recovery system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of implementing a key recovery system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of implementing a key recovery system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3120801