Process for cryptographic key generation and safekeeping

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 46, 380 30, 380 45, 364717, H04L 900

Patent

active

056756496

ABSTRACT:
A process for cryptographic key generation and safekeeping is provided. A plurality of key agents are selected, each having a copy of the source code. One copy of the source code is loaded onto a secure computer system and is compared with at least one other copy of the source code to validate the loaded copy of the source code. Master key information and locking key information are generated by executing compiled source code. The master key information is then separated into a plurality of master key shares which are distributed to master key agents such that each master key agent possesses one master key share. The locking key information is separated into a plurality of locking key shares which are distributed to locking key agents such that each locking key agent possesses one locking key share. Then, the plurality of locking key shares and the plurality of master key shares are validated, and the secure computer system is securely shut down.

REFERENCES:
patent: 4032763 (1977-06-01), Glitz
patent: 4151404 (1979-04-01), Harrington et al.
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4395703 (1983-07-01), Piosenka
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4673871 (1987-06-01), Brown et al.
patent: 4944009 (1990-07-01), Micali et al.
patent: 4995082 (1991-02-01), Schnorr
patent: 5057795 (1991-10-01), Napier
patent: 5146497 (1992-09-01), Bright
patent: 5220603 (1993-06-01), Parker et al.
patent: 5515307 (1996-05-01), Aiello et al.
patent: 5602917 (1997-02-01), Mueller
Werner Alexi, Benny Chor, Oded Goldreich, and Claus P. Schnorr. RSA and Rabin Functions: SIAM Journal on Computing, 17(2):194-209, Apr. 1988.
L. Blum, M. Blum, and M. Shub. SIAM Journal on Computing, 15(2):364-381, May 1986.
Benny Chor, Oded Goldreich, and Shafi Goldwasser, Advances in Cryptology: Proceedings of Crypto85, pp. 448-457, 1986.
Ueli M. Maurer, Cryptography and Coding, pp. 173-191, 1992.
Ueli M. Maurer, Journal of Cryptology, to appear.
National Institute of Standards and Technology. FIPS PUB 980: Secure Hash Standard, May 1993.
National Institute of Standards and Technology. FIPS PUB 140-1: Security Requirements for Cryptographic Modules, Jan. 1994. Supersedes FIPS PUB 140-1982 Apr. 14.
R.L. Rivest, A. Shamir, and L. Adleman, Communications of the ACM, 21(2):120-126, Feb. 1978.
Umesh V. Vazirani and Vijay V. Vazirani, Proc. 25th IEEE Symposium on Foundations of Computer Science, pp. 458-463, 1984.
Andrew C. Yao, Proc. 23rd Annual Symposium on Foundations of Computer Science, pp. 80-91, 1982.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Process for cryptographic key generation and safekeeping does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Process for cryptographic key generation and safekeeping, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Process for cryptographic key generation and safekeeping will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2363733

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.