Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1995-11-30
1997-10-07
Cain, David C.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 46, 380 30, 380 45, 364717, H04L 900
Patent
active
056756496
ABSTRACT:
A process for cryptographic key generation and safekeeping is provided. A plurality of key agents are selected, each having a copy of the source code. One copy of the source code is loaded onto a secure computer system and is compared with at least one other copy of the source code to validate the loaded copy of the source code. Master key information and locking key information are generated by executing compiled source code. The master key information is then separated into a plurality of master key shares which are distributed to master key agents such that each master key agent possesses one master key share. The locking key information is separated into a plurality of locking key shares which are distributed to locking key agents such that each locking key agent possesses one locking key share. Then, the plurality of locking key shares and the plurality of master key shares are validated, and the secure computer system is securely shut down.
REFERENCES:
patent: 4032763 (1977-06-01), Glitz
patent: 4151404 (1979-04-01), Harrington et al.
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4395703 (1983-07-01), Piosenka
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4673871 (1987-06-01), Brown et al.
patent: 4944009 (1990-07-01), Micali et al.
patent: 4995082 (1991-02-01), Schnorr
patent: 5057795 (1991-10-01), Napier
patent: 5146497 (1992-09-01), Bright
patent: 5220603 (1993-06-01), Parker et al.
patent: 5515307 (1996-05-01), Aiello et al.
patent: 5602917 (1997-02-01), Mueller
Werner Alexi, Benny Chor, Oded Goldreich, and Claus P. Schnorr. RSA and Rabin Functions: SIAM Journal on Computing, 17(2):194-209, Apr. 1988.
L. Blum, M. Blum, and M. Shub. SIAM Journal on Computing, 15(2):364-381, May 1986.
Benny Chor, Oded Goldreich, and Shafi Goldwasser, Advances in Cryptology: Proceedings of Crypto85, pp. 448-457, 1986.
Ueli M. Maurer, Cryptography and Coding, pp. 173-191, 1992.
Ueli M. Maurer, Journal of Cryptology, to appear.
National Institute of Standards and Technology. FIPS PUB 980: Secure Hash Standard, May 1993.
National Institute of Standards and Technology. FIPS PUB 140-1: Security Requirements for Cryptographic Modules, Jan. 1994. Supersedes FIPS PUB 140-1982 Apr. 14.
R.L. Rivest, A. Shamir, and L. Adleman, Communications of the ACM, 21(2):120-126, Feb. 1978.
Umesh V. Vazirani and Vijay V. Vazirani, Proc. 25th IEEE Symposium on Foundations of Computer Science, pp. 458-463, 1984.
Andrew C. Yao, Proc. 23rd Annual Symposium on Foundations of Computer Science, pp. 80-91, 1982.
Brennan J. J.
Geist Bruce K.
Van Eeuwen Jeffrey A.
Cain David C.
Electronic Data Systems Corporation
Griebenow L. Joy
LandOfFree
Process for cryptographic key generation and safekeeping does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Process for cryptographic key generation and safekeeping, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Process for cryptographic key generation and safekeeping will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2363733