CIPHER KEY MANAGING METHOD AND APPARATUS

    公开(公告)号:JPH02300784A

    公开(公告)日:1990-12-12

    申请号:JP11066090

    申请日:1990-04-27

    Applicant: IBM

    Abstract: PURPOSE: To obtain a cryptographic key managing method excellent in security protection of a cipher by inspecting the first and second fields of a candidate control vector so as to allow the restoration of the cryptographic key only when the execution of a ciphering function is permitted. CONSTITUTION: A first control vector inspecting means receives the first part of a related control vector, judges whether the execution of the ciphering function is permitted by using the cryptographic key and outputs a first permission signal. A second control vector inspecting means receives the second part of the related control vector, judges whether the execution of the ciphering function is permitted by using the cryptographic key and outputs a second permission signal. A cipher processing means starts the execution of the ciphering function by using cryptographic key in response to the first and second permission signals. Thereby a managing means excellent in the security protection and the maintainability of ciphers.

    VERIFYING DEVICE AND VERIFYING METHOD

    公开(公告)号:JPH02101491A

    公开(公告)日:1990-04-13

    申请号:JP21080289

    申请日:1989-08-17

    Applicant: IBM

    Abstract: PURPOSE: To completely cipher a part of data and to cause a permitted receiver to decode the other part by combining control vectors giving the permission of the use of a data ciphering key and a key that the transmitter of the key intends for the ciphering of data. CONSTITUTION: A cipher mechanism 4 is characterized by a safety protection boundary 6. An example for restoring the cipher key from a cipher key storage mechanism 22 is to permit a control vector inspection mechanism 14 to output a permission signal for restoring the cipher key to a cipher processing mechanism 16 through a line 20 when a cipher instruction storage device receives a cipher service request obtaining the restoration of the cipher key through an input/output route 8. Thus, the cipher processing mechanism 16 receives the cipher key ciphered from the cipher key storage mechanism 22 in response to the permission key in the line 20 and restores the cipher key ciphered under a stored key being the AND of a related control vector and a master key stored in a master key storage mechanism 18.

    CRYPTOGRAPHIC DEVICE
    3.
    发明专利

    公开(公告)号:JPH02106787A

    公开(公告)日:1990-04-18

    申请号:JP20711489

    申请日:1989-08-11

    Applicant: IBM

    Abstract: PURPOSE: To improve the management of a cipher key by forming a cipher by means of connecting it to a key in accordance with a ciphering procedure and preventing the key from being ciphered only when a control vector is precisely applied to cipher hardware. CONSTITUTION: A 64 bits key K is ciphered with the key ciphering key KK (constituted of 64 bits on the left half named as KKL and 64 bits on the right half named as KKR) of 128 bits and the 64 bits control vector C of a register 40'. In such a case, a register 46L exclusively OR-operates CL of a register 40L and KKL of a register 42L and sets KKL+CL. A register 46 exclusively OR-operates CR of a register 40R and KKR of a register 42R and sets KKL +CR. Namely, a method for using C where the left half bit part and the right half bit part are equal and the 64 bits control vector is obtained by reducing the method for using a 128 bits control vector. Thus, the control vector is doubled and the newly improved cipher can be obtained. Then, the improved method of cipher key management can be obtained.

    CERTIFYING DEVICE AND CERTIFYING METHOD

    公开(公告)号:JPH0299984A

    公开(公告)日:1990-04-11

    申请号:JP20711289

    申请日:1989-08-11

    Applicant: IBM

    Abstract: PURPOSE: To protect the cipher function and the safety of a stored or distributed key by permitting a cipher instruction storage device to execute a key management function with a cipher key, permitting a control vector inspection means to judge that the key management function is permitted, and permitting a cipher processing means to execute the requested key management function with the cipher key. CONSTITUTION: When a cipher instruction storage mechanism 10 receives a cipher service request for obtaining the restoration of the cipher key from a cipher key storage mechanism 22, the control vector inspection mechanism 14 outputs a permission signal showing that the function for restoring the cipher key is permitted to the cipher processing mechanism 16 through a line 20. Then, the cipher processing mechanism 16 receives the cipher key ciphered from the cipher key storage mechanism 22 and operates not to cipher the cipher key ciphered under a stored key being AND with a related control vector and a master key stored in a master key storage mechanism 18. Thus, practical and highly flexible key management technology can be obtained.

    CONTROL VECTOR CONVERSION AND DEVICE THEREFOR

    公开(公告)号:JPH03181245A

    公开(公告)日:1991-08-07

    申请号:JP28606390

    申请日:1990-10-25

    Applicant: IBM

    Abstract: PURPOSE: To safely and flexibly control keys by using control vectors in a different sort key delivery environment. CONSTITUTION: Mask vectors in a control vector transformation table are logically combined with specific control vectors C5, C6. When the mask vectors are carefully set up, a system operator can request the check of specific bits of respective control vectors C5, C6 for a certain specific value before permitting requested transformation. When the check has failed, the transformation of a key K from the vector C5 to the vector C6 is not executed. Thus the system operator can control key transformation also based on an attribute allocated to a key ciphering key which is a base for the transformation of the key K in addition to the values of the control vectors C5, C6 in the control vector transformation table.

Patent Agency Ranking