METHOD AND APPARATUS FOR FORMING OFFICIAL AND PRIVATE KEY PAIR BY USING PASS PHRASE

    公开(公告)号:JPH05224604A

    公开(公告)日:1993-09-03

    申请号:JP23128492

    申请日:1992-08-06

    Applicant: IBM

    Abstract: PURPOSE: To make a user port public and private keys from a certain cipher system to another cipher system and improve security protection, by generating a pair of the public key and the private key from a path phrase first. CONSTITUTION: This device is provided with a cipher facility 30, a cipher key data set 32, a ciphering mechanism access program 24 and an application program 36. Then, the first pair of the public key and the private key is generated by using a first seed value known to the user and a first control vector for defining the first private use of the first pair of the public key and the private key is generated. Then, the second pair of the public key and the private key is generated by using a second seed value known to the user and a second control vector for defining the second private use of the second pair of the public key and the private key is generated. Then, the private use of the first pair of the public key and the private key is controlled by using the first control vector and the private use of the second pair of the public key and the private key is controlled by using the second control vector.

    CIPHER KEY MANAGING METHOD AND APPARATUS

    公开(公告)号:JPH02300784A

    公开(公告)日:1990-12-12

    申请号:JP11066090

    申请日:1990-04-27

    Applicant: IBM

    Abstract: PURPOSE: To obtain a cryptographic key managing method excellent in security protection of a cipher by inspecting the first and second fields of a candidate control vector so as to allow the restoration of the cryptographic key only when the execution of a ciphering function is permitted. CONSTITUTION: A first control vector inspecting means receives the first part of a related control vector, judges whether the execution of the ciphering function is permitted by using the cryptographic key and outputs a first permission signal. A second control vector inspecting means receives the second part of the related control vector, judges whether the execution of the ciphering function is permitted by using the cryptographic key and outputs a second permission signal. A cipher processing means starts the execution of the ciphering function by using cryptographic key in response to the first and second permission signals. Thereby a managing means excellent in the security protection and the maintainability of ciphers.

    CRYPTOGRAPHIC DEVICE
    5.
    发明专利

    公开(公告)号:JPH04240888A

    公开(公告)日:1992-08-28

    申请号:JP15963291

    申请日:1991-06-04

    Applicant: IBM

    Abstract: PURPOSE: To improve the security of control vector enforcement by generating, taking out or selecting a control vector within the security boundary of a ciphering facility. CONSTITUTION: An instruction storing means 94 includes a storage means for a group of executable routines and each routine includes a code necessary for processing one ciphering facility instruction. The instruction processor 96 of a cipher conversion means 36 fetches a routine code from the instruction storage means 94 corresponding to an optional code 50 received from an information selecting means through a channel 42 and executes it. The instruction processor 96 fetches a proper executable code through a processing parameter 52 from input information selected through the channel 42.

    VERIFYING DEVICE AND VERIFYING METHOD

    公开(公告)号:JPH02101491A

    公开(公告)日:1990-04-13

    申请号:JP21080289

    申请日:1989-08-17

    Applicant: IBM

    Abstract: PURPOSE: To completely cipher a part of data and to cause a permitted receiver to decode the other part by combining control vectors giving the permission of the use of a data ciphering key and a key that the transmitter of the key intends for the ciphering of data. CONSTITUTION: A cipher mechanism 4 is characterized by a safety protection boundary 6. An example for restoring the cipher key from a cipher key storage mechanism 22 is to permit a control vector inspection mechanism 14 to output a permission signal for restoring the cipher key to a cipher processing mechanism 16 through a line 20 when a cipher instruction storage device receives a cipher service request obtaining the restoration of the cipher key through an input/output route 8. Thus, the cipher processing mechanism 16 receives the cipher key ciphered from the cipher key storage mechanism 22 in response to the permission key in the line 20 and restores the cipher key ciphered under a stored key being the AND of a related control vector and a master key stored in a master key storage mechanism 18.

    CRYPTOGRAPHIC DEVICE
    7.
    发明专利

    公开(公告)号:JPH02106787A

    公开(公告)日:1990-04-18

    申请号:JP20711489

    申请日:1989-08-11

    Applicant: IBM

    Abstract: PURPOSE: To improve the management of a cipher key by forming a cipher by means of connecting it to a key in accordance with a ciphering procedure and preventing the key from being ciphered only when a control vector is precisely applied to cipher hardware. CONSTITUTION: A 64 bits key K is ciphered with the key ciphering key KK (constituted of 64 bits on the left half named as KKL and 64 bits on the right half named as KKR) of 128 bits and the 64 bits control vector C of a register 40'. In such a case, a register 46L exclusively OR-operates CL of a register 40L and KKL of a register 42L and sets KKL+CL. A register 46 exclusively OR-operates CR of a register 40R and KKR of a register 42R and sets KKL +CR. Namely, a method for using C where the left half bit part and the right half bit part are equal and the 64 bits control vector is obtained by reducing the method for using a 128 bits control vector. Thus, the control vector is doubled and the newly improved cipher can be obtained. Then, the improved method of cipher key management can be obtained.

    INDIVIDUAL IDENTIFYING NUMBER PROCESSING METHOD

    公开(公告)号:JPH02105192A

    公开(公告)日:1990-04-17

    申请号:JP21154689

    申请日:1989-08-18

    Applicant: IBM

    Abstract: PURPOSE: To provide a flexible method for key-connecting a format, use and processing permission by correlating a control vector permitting key use, which the setter of the key intends, to the generation key of a personal identification number(PIN) and the ciphering key of PIN. CONSTITUTION: Restriction for the permission of the related key is contained in use designated by the control vector with several PIN processing instructions such as the generation, verification and conversion of PIN and PIN block generation. The control vector restricts the permission of the several instructions for processing clear sentence PIN input at the time of PIN verification and the like. Furthermore, the control vector identifies the PIN processing for specified PIN format or specified processing algorithm and contains information for restriction according to circumstances. Thus, the flexible method for connecting the format, use and processing permission to the key is obtained by introducing such control vector.

    CERTIFYING DEVICE AND CERTIFYING METHOD

    公开(公告)号:JPH0299984A

    公开(公告)日:1990-04-11

    申请号:JP20711289

    申请日:1989-08-11

    Applicant: IBM

    Abstract: PURPOSE: To protect the cipher function and the safety of a stored or distributed key by permitting a cipher instruction storage device to execute a key management function with a cipher key, permitting a control vector inspection means to judge that the key management function is permitted, and permitting a cipher processing means to execute the requested key management function with the cipher key. CONSTITUTION: When a cipher instruction storage mechanism 10 receives a cipher service request for obtaining the restoration of the cipher key from a cipher key storage mechanism 22, the control vector inspection mechanism 14 outputs a permission signal showing that the function for restoring the cipher key is permitted to the cipher processing mechanism 16 through a line 20. Then, the cipher processing mechanism 16 receives the cipher key ciphered from the cipher key storage mechanism 22 and operates not to cipher the cipher key ciphered under a stored key being AND with a related control vector and a master key stored in a master key storage mechanism 18. Thus, practical and highly flexible key management technology can be obtained.

Patent Agency Ranking