Secure management of keys using extended control vectors

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 45, 380 49, H04L 902

Patent

active

049245155

ABSTRACT:
A method and apparatus are disclosed for use in a data processing system which executes a program which outputs cryptographic service requests for operations with cryptographic keys which are associated with control vectors defining the functions which each key is allowed by its originator to perform. The improved method and apparatus enable the use of control vectors having an arbitrary length. It includes a control vector register having an arbitrary length, for storing a control vector of arbitrary length associated with an N-bit cryptographic key. It further includes a control vector checking means having an input coupled to the control vector register, for checking that the control vector authorizes the cryptographic function which is requested by the cryptographic service request. It further includes a hash function generator having an input coupled to the control vector register and an N-bit output, for mapping the control vector output from the control vector register, into an N-bit hash value. A key register is included for storing the N-bit cryptographic key. It further includes a logic block having a first input coupled to the N-bit output of the hash function generator, and a second input connected to the key register, for forming at the output thereof a product of the N-bit key and the N-bit hash value. Finally, an encryption device is included having a first input for receiving a cleartext data stream and a key input coupled to the output of the logic block, for forming a ciphertext data stream at the output thereof from the cleartext data stream and the product. A decryption device can be substituted for the encryption device to perform decryption operations in a similar manner.

REFERENCES:
patent: 4218738 (1980-08-01), Matyas et al.
patent: 4223403 (1980-09-01), Konheim et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4386623 (1983-08-01), Smid et al.
patent: 4500750 (1985-02-01), Elander et al.
patent: 4503287 (1985-03-01), Morris et al.
patent: 4578536 (1986-03-01), Zeidler
patent: 4633037 (1986-12-01), Serpell
patent: 4683968 (1987-08-01), Applebaum et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4723283 (1988-02-01), Nasagawa et al.
patent: 4723284 (1988-02-01), Muck et al.
patent: 4747050 (1988-05-01), Brachtl et al.
patent: 4755940 (1988-07-01), Brachtl et al.
patent: 4850017 (1989-07-01), Matyas et al.
"Some Techniques for Handling Encipherment Keys", R. W. Jones, ICL Tech. Journal (11/82) pp. 175-188.
"Security for Computer Networks", Davies et al., John Wiley & Sons, pp. 168-172.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure management of keys using extended control vectors does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure management of keys using extended control vectors, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure management of keys using extended control vectors will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2355745

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.