Data cryptography operations using control vectors
    1.
    发明授权
    Data cryptography operations using control vectors 失效
    使用控制向量的数据加密操作

    公开(公告)号:US4918728A

    公开(公告)日:1990-04-17

    申请号:US401486

    申请日:1989-08-30

    IPC分类号: G06F9/30 H04L9/08

    摘要: Data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorization for the uses of the key intended by the originator of the key. Among the uses specified by the control vector are limitations on encryption, decryption, authentication code generation and verification, translation of the user's data. Complex combinations of data manipulation functions are possible using the control vectors, in accordance with the invention. The system administrator can exercise flexibility in changing the implementation of his security policy by selecting appropriate control vectors in accordance with the invention. Complex scenarios such as encrypted mail box, session protection, file protection, ciphertext translation center, peer-to-peer ciphertext translation, message authentication, message authentication with non-repudiation and many others can be easily implemented by a system designer using the control vectors, in accordance with the invention.

    摘要翻译: 通过与数据密码密钥相关联的控制向量来提供数据加密,该控制向量为密钥的发起者使用的密钥的使用提供授权。 控制向量指定的用途是对加密,解密,认证码生成和验证,用户数据的翻译的限制。 根据本发明,使用控制向量可以实现数据操作功能的复杂组合。 系统管理员可以通过根据本发明选择适当的控制向量来灵活地改变其安全策略的实现。 复杂场景如加密邮箱,会话保护,文件保护,密文翻译中心,点对点密文翻译,消息认证,具有不可否认性的消息认证等等可以很容易地由系统设计者使用控制向量 ,根据本发明。

    Secure key management using programable control vector checking
    2.
    发明授权
    Secure key management using programable control vector checking 失效
    使用可编程控制向量检查实现安全密钥管理

    公开(公告)号:US5007089A

    公开(公告)日:1991-04-09

    申请号:US506319

    申请日:1990-04-09

    IPC分类号: G06F21/22 G09C1/00 H04L9/08

    CPC分类号: H04L9/088

    摘要: The invention includes a control vector checking code respository located either within the same system as the crytographic facility or alternately remotely from the system containing the cryptographic facility. The control vector checking code repository will be linked to the cryptographic facility by one of several means. A first means for linking the repository to the cryptographic facility would include a physically secure data communications link. A second means for connecting the repository to the cryptographic facility would be by using an insecure channel with authentication, wherein either a modification detection code or alternately a message authentication code would be transmitted to the cryptographic facility and then the desired control vector checking code would be transmitted over the link. The cryptographic facility will include a code authorization mechanism to compare the transmitted MAC or MDC with a corresponding value computed from the received control vector checking code. If the two values of the MDC or the MAC compare, then the control vector checking code is authenticated and loaded into the control vector checking unit for carrying out the control vector checking operations desired. The control vector checking code repository can be located in a remote system connected by means of the communications link to the crypto facility, or alternately the repository can reside in the same system as the crypto facility. This provides for the dynamic updating of control vector checking code, where improvements or alterations are made to the control vector checking sequence. This also provides for a reduced memory size in the crypto facility, being sufficiently large to accommodate subsidiary control vector checking applications, with alternate control vector checking applications requiring the reloading of the control vector checking unit from the repository.

    Public key cryptosystem key management based on control vectors
    3.
    发明授权
    Public key cryptosystem key management based on control vectors 失效
    基于控制向量的公钥关键CRYPTOSYSTEM密钥管理

    公开(公告)号:US5200999A

    公开(公告)日:1993-04-06

    申请号:US766260

    申请日:1991-09-27

    IPC分类号: G09C1/00 G06F9/30 H04L9/08

    摘要: A data processing system, method and program are disclosed, for managing a public key cryptographic system. The method includes the steps of generating a first public key and a first private key as a first pair in the data processing system, for use with a first public key algorithm and further generating a second public key and a second private key as a second pair in the data processing system, for use with a second public key algorithm. The method then continues by assigning a private control vector for the first private key and the second private key in the data processing system, for defining permitted uses for the first and second private keys. Then the method continues by forming a private key record which includes the first private key and the second private key in the data processing system, and encrypting the private key record under a first master key expression which is a function of the private control vector. The method then forms a private key token which includes the private control vector and the private key record, and stores the private key token in the data processing system.At a later time, the method receives a first key use request in the data processing system, requiring the first public key algorithm. In response to this, the method continues by accessing the private key token in the data processing system and checking the private control vector to determine if the private key record contains a key having permitted uses which will satisfy the first request. The method then decrypts the private key record under the first master key expression in the data processing system and extracts the first private key from the private key record. The method selects the first public key algorithm in the data processing system for the first key use request and executes the first public key algorithm in the data processing system using the first private key to perform a cryptographic operation to satisfy the first key use request.

    Method for generating public and private key pairs without using a
passphrase
    7.
    发明授权
    Method for generating public and private key pairs without using a passphrase 失效
    没有使用PASSPHRASE产生公共和私人关键对的方法

    公开(公告)号:US5201000A

    公开(公告)日:1993-04-06

    申请号:US766533

    申请日:1991-09-27

    摘要: A data processing system, program and method are disclosed for managing a public key cryptographic system which includes a public key, private key pair generator. The method includes the step of generating a first public key, private key pair using a first seed value known to a user, the first seed value being generated from a passphrase. A first random number is generated using the first seed value and applied to generating the first key pair. The method then generates a first control vector defining a first use of the first public key, private key pair.The method then continues with the step of generating a second public key, private key pair using a second seed value unknown to the user, the second seed value being a true random number. The second random number is generated using the second seed value in a pseudorandom number generator and applied to generating the second key pair. The method generates a second control vector defining a second use of the second public key, private key pair.The method then controls the use of the first public key, private key pair using the first control vector and controls the use of the second public key, private key pair with the second control vector.

    Hybrid public key algorithm/data encryption algorithm key distribution
method based on control vectors
    8.
    发明授权
    Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors 失效
    基于控制向量的混合公钥算法/数据加密算法密钥分配方法

    公开(公告)号:US5142578A

    公开(公告)日:1992-08-25

    申请号:US748407

    申请日:1991-08-22

    摘要: The patent describes a method and apparatus for securely distributing an initial Data Encryption Algorithm (DEA) key-encrypting key by encrypting a key record (consisting of the key-encrypting key and control information associated with that key-encrypting key) using a public key algorithm and a public key belonging to the intended recipient of the key record. The patent further describes a method and apparatus for securely recovering the distributed key-encrypting key by the recipient by decrypting the received key record using the same public key algorithm and private key associated with the public key and re-encrypting the key-encrypting key under a key formed by arithmetically combining the recipient's master key with a control vector contained in the control information of the received key record. Thus the type and usage attributes assigned by the originator of the key-encrypting key in the form of a control vector are cryptographically coupled to the key-encrypting key such that the recipient may only use the received key-encrypting key in a manner defined by the key originator.The patent further describes a method and apparatus to improve the integrity of the key distribution process by applying a digital signature to the key record and by including identifying information (i.e., an originator identifier) in the control information of the key record. The integrity of the distribution process is enhanced by verifying the digital signature and originator identifier at the recipient node.

    Secure cryptographic operations using control vectors generated inside a
cryptographic facility
    9.
    发明授权
    Secure cryptographic operations using control vectors generated inside a cryptographic facility 失效
    使用在加密设施内生成的控制向量来保护加密操作

    公开(公告)号:US5432849A

    公开(公告)日:1995-07-11

    申请号:US103953

    申请日:1993-08-10

    CPC分类号: G06F12/1408

    摘要: The invention described herein suggests methods of cryptographic key management based on control vectors in which the control vectors are generated or derived internal to a cryptographic facility implementing a set of cryptographic operations. The methods of alternate control vector enforcement described in the present application provide a high-integrity facility to ensure that cryptographic keys are used in a manner consistent with the type and usage attributes assigned to the keys by the originator of those keys. Since the control vectors are generated or derived internal to the cryptographic facility on the basis of data contained in each cryptographic service request to the cryptographic facility, control vectors need not be stored or managed outside the cryptographic facility.

    摘要翻译: 本文所述的发明提出了基于控制向量的加密密钥管理方法,其中控制向量在实现一组密码操作的密码设施内部生成或导出。 在本申请中描述的替代控制向量实现的方法提供了高完整性设施,以确保以与这些密钥的发起者分配给密钥的类型和使用属性一致的方式使用加密密钥。 由于根据密码设备的每个密码服务请求中包含的数据,在密码设备的内部生成或导出控制向量,因此控制向量不需要在密码设备之外进行存储或管理。