Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1988-08-11
1990-07-10
Tarcza, Thomas H.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 25, 380 45, 380 47, H04K 100
Patent
active
049411764
ABSTRACT:
The invention is an apparatus and method for validating that key management functions requested for a cryptographic key by the program have been authorized by the originator of the key. The invention includes a cryptographic facility characterized by a secure boundary through which passes an input path for receiving the cryptographic service requests, cryptographic keys and their associated control vectors, and an output path for providing responses thereto. There can be included within the boundary a cryptographic instruction storage coupled to the input path, a control vector checking unit and a cryptographic processing unit coupled to the instruction storage, and a master key storage coupled to the processing means, for providing a secure location for executing key management functions in response to the received service requests. The cryptographic instruction storage receives over the input path a cryptographic service request for performing a key management function on a cryptographic key. The control vector checking unit has an input coupled to the input path for receiving a control vector associated with the cryptographic key and an input connected to the cryptographic instruction storage, for receiving control signals to initiate checking that the control vector authorizes the key management function which is requested by the cryptographic service request. The control vector checking unit has an authorization output connected to an input of the cryptographic processing means, for signalling that the key management function is authorized, the receipt of which by the cryptographic processing unit initiates the performance of the requested key management function with the cryptographic key. The invention enables the flexible control of many cryptographic key management functions in the generation, distribution and use of cryptographic keys, while maintaining a high security standard.
REFERENCES:
patent: 4218738 (1980-08-01), Matyas et al.
patent: 4223403 (1980-09-01), Kinheim et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4386233 (1983-08-01), Smid et al.
patent: 4500750 (1985-02-01), Elander et al.
patent: 4503287 (1985-03-01), Morris et al.
patent: 4578530 (1986-03-01), Zeidler
patent: 4683968 (1987-08-01), Applebaum et al.
patent: 4723283 (1988-02-01), Nasagawa et al.
patent: 4723284 (1988-02-01), Munek et al.
patent: 4850017 (1989-07-01), Matyas et al.
R. W. Jones, "Some Techniques for Handling Encipherment Keys," ICL Technical Journal, Nov. 1982, pp. 175-188.
D. W. Davies et al., "Security for Computer Networks," John Wiley & Sons, New York, 1984, Sec. 6.5, pp. 168-172.
Abraham Dennis G.
Johnson Donald B.
Karne Ramesh K.
Le An V.
Matyas Stephen M.
Cain David
Hoel John E.
International Business Machines - Corporation
Tarcza Thomas H.
LandOfFree
Secure management of keys using control vectors does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure management of keys using control vectors, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure management of keys using control vectors will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1725361