Secure management of keys using control vectors

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 25, 380 45, 380 47, H04K 100

Patent

active

049411764

ABSTRACT:
The invention is an apparatus and method for validating that key management functions requested for a cryptographic key by the program have been authorized by the originator of the key. The invention includes a cryptographic facility characterized by a secure boundary through which passes an input path for receiving the cryptographic service requests, cryptographic keys and their associated control vectors, and an output path for providing responses thereto. There can be included within the boundary a cryptographic instruction storage coupled to the input path, a control vector checking unit and a cryptographic processing unit coupled to the instruction storage, and a master key storage coupled to the processing means, for providing a secure location for executing key management functions in response to the received service requests. The cryptographic instruction storage receives over the input path a cryptographic service request for performing a key management function on a cryptographic key. The control vector checking unit has an input coupled to the input path for receiving a control vector associated with the cryptographic key and an input connected to the cryptographic instruction storage, for receiving control signals to initiate checking that the control vector authorizes the key management function which is requested by the cryptographic service request. The control vector checking unit has an authorization output connected to an input of the cryptographic processing means, for signalling that the key management function is authorized, the receipt of which by the cryptographic processing unit initiates the performance of the requested key management function with the cryptographic key. The invention enables the flexible control of many cryptographic key management functions in the generation, distribution and use of cryptographic keys, while maintaining a high security standard.

REFERENCES:
patent: 4218738 (1980-08-01), Matyas et al.
patent: 4223403 (1980-09-01), Kinheim et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4386233 (1983-08-01), Smid et al.
patent: 4500750 (1985-02-01), Elander et al.
patent: 4503287 (1985-03-01), Morris et al.
patent: 4578530 (1986-03-01), Zeidler
patent: 4683968 (1987-08-01), Applebaum et al.
patent: 4723283 (1988-02-01), Nasagawa et al.
patent: 4723284 (1988-02-01), Munek et al.
patent: 4850017 (1989-07-01), Matyas et al.
R. W. Jones, "Some Techniques for Handling Encipherment Keys," ICL Technical Journal, Nov. 1982, pp. 175-188.
D. W. Davies et al., "Security for Computer Networks," John Wiley & Sons, New York, 1984, Sec. 6.5, pp. 168-172.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure management of keys using control vectors does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure management of keys using control vectors, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure management of keys using control vectors will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1725361

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.