Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Method for Ensuring the Integrity of Public Key Algorithm Public and Private Keys and for Coupling the Usage of a Key to the Correct Specification of the Key's Associated Control Vector

IP.com Disclosure Number: IPCOM000112608D
Original Publication Date: 1994-Jun-01
Included in the Prior Art Database: 2005-Mar-27
Document File: 4 page(s) / 144K

Publishing Venue

IBM

Related People

Johnson, DB: AUTHOR [+4]

Abstract

+--------------------------------------------+ | PKA Key | Control vector | Additional info.| +--------------------------------------------+ | V +---------------+ | Padding | +---------------+ | A1, A2, ...

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 34% of the total text.

Method for Ensuring the Integrity of Public Key Algorithm Public
and Private Keys and for Coupling the Usage of a Key to the Correct
Specification of the Key's Associated Control Vector

         +--------------------------------------------+
         | PKA Key | Control vector | Additional info.|
         +--------------------------------------------+
                              |
                              V
                      +---------------+
                      |    Padding    |
                      +---------------+
                              | A1, A2, ...  An
                              |
  +-----------+       +---------------+
  | DEA Key 1 |-------|  CBC Encrypt  |
  +-----------+       ----------------+
                              | Bn (last block)
                              V
  +-----------+       +---------------+
  | DEA Key 2 |-------|  ECB Decrypt  |
  +-----------+       +---------------+
                              |
                              V
  +-----------+       +---------------+
  | DEA Key 1 |-------|  ECB Encrypt  |
  +-----------+       +---------------+
                              |
                              V  Key authentication code

      A method to ensure the integrity of public and private keys
belonging to a public key algorithm is described.  This method also
may be used to cryptographically couple important information about
the key (e.g., the owner, intended use, validity dates, etc.) to the
value of the key.

      This article describes a method for ensuring the integrity of
public and private keys belonging to a public key, or asymmetric key,
cryptographic algorithm.  The method makes use of a System Key
Authentication Key (SKAK) belonging to a private key, or symmetric
key, algorithm such as the Data Encryption Algorithm (DEA).  The SKAK
may also be used to couple the recovery and use of a key to the
correct specification of its associated control vector and other
associated information.  Note that any checking of the coupled
information for validity still must be done and is not addressed by
this method.

      The SKAK is initialized when the cryptographic subsystem is
initialized, stored in internal memory of the subsystem, and is used
only by the subsystem during the internal processing of operational
PKA keys.  Other uses of the SKAK, in particular the ability of a
user application to use the key, are specifically prohibited and the
implementation must ensure this via some method.  For examples of a
method of restricting...