-
公开(公告)号:JPH02101491A
公开(公告)日:1990-04-13
申请号:JP21080289
申请日:1989-08-17
Applicant: IBM
Inventor: SUTEIBUN EMU MACHIIISU , DENISU JIII ABURAHAMU , DONARUDO BIII JIYONSON , RAMESHIYU KEI KAAN , AN BUI RI , ROSUTEISUROO PURAIMATSUKU , JIYURIAN TOOMASU , JIYON DEII UIRUKINZU , FUIRII SHIII JIEI
Abstract: PURPOSE: To completely cipher a part of data and to cause a permitted receiver to decode the other part by combining control vectors giving the permission of the use of a data ciphering key and a key that the transmitter of the key intends for the ciphering of data. CONSTITUTION: A cipher mechanism 4 is characterized by a safety protection boundary 6. An example for restoring the cipher key from a cipher key storage mechanism 22 is to permit a control vector inspection mechanism 14 to output a permission signal for restoring the cipher key to a cipher processing mechanism 16 through a line 20 when a cipher instruction storage device receives a cipher service request obtaining the restoration of the cipher key through an input/output route 8. Thus, the cipher processing mechanism 16 receives the cipher key ciphered from the cipher key storage mechanism 22 in response to the permission key in the line 20 and restores the cipher key ciphered under a stored key being the AND of a related control vector and a master key stored in a master key storage mechanism 18.
-
公开(公告)号:JPH02106787A
公开(公告)日:1990-04-18
申请号:JP20711489
申请日:1989-08-11
Applicant: IBM
Inventor: SUTEIBUN EMU MACHIIISU , DENISU JIII ABURAHAMU , UIRIAMU SHIII AANORUDO , DONARUDO BIII JIYONSON , RAMESHIYU KEI KAAN , AN BUI RI , ROSUTEISUROO PURAIMATSUKU , SUTEIBU AARU HOWAITO , JIYON DEII UIRUKINZU
Abstract: PURPOSE: To improve the management of a cipher key by forming a cipher by means of connecting it to a key in accordance with a ciphering procedure and preventing the key from being ciphered only when a control vector is precisely applied to cipher hardware. CONSTITUTION: A 64 bits key K is ciphered with the key ciphering key KK (constituted of 64 bits on the left half named as KKL and 64 bits on the right half named as KKR) of 128 bits and the 64 bits control vector C of a register 40'. In such a case, a register 46L exclusively OR-operates CL of a register 40L and KKL of a register 42L and sets KKL+CL. A register 46 exclusively OR-operates CR of a register 40R and KKR of a register 42R and sets KKL +CR. Namely, a method for using C where the left half bit part and the right half bit part are equal and the 64 bits control vector is obtained by reducing the method for using a 128 bits control vector. Thus, the control vector is doubled and the newly improved cipher can be obtained. Then, the improved method of cipher key management can be obtained.
-
公开(公告)号:JPH0299984A
公开(公告)日:1990-04-11
申请号:JP20711289
申请日:1989-08-11
Applicant: IBM
Inventor: SUTEIBUN EMU MACHIIISU , DENISU JIII ABURAHAMU , DONARUDO BIII JIYONSON , RAMESHIYU KEI KAAN , AN BUI RI , ROSUTEISUROO PURAIMATSUKU , JIYURIAN TOOMASU , JIYON DEII UIRUKINZU , FUIRII SHIII JIEI
Abstract: PURPOSE: To protect the cipher function and the safety of a stored or distributed key by permitting a cipher instruction storage device to execute a key management function with a cipher key, permitting a control vector inspection means to judge that the key management function is permitted, and permitting a cipher processing means to execute the requested key management function with the cipher key. CONSTITUTION: When a cipher instruction storage mechanism 10 receives a cipher service request for obtaining the restoration of the cipher key from a cipher key storage mechanism 22, the control vector inspection mechanism 14 outputs a permission signal showing that the function for restoring the cipher key is permitted to the cipher processing mechanism 16 through a line 20. Then, the cipher processing mechanism 16 receives the cipher key ciphered from the cipher key storage mechanism 22 and operates not to cipher the cipher key ciphered under a stored key being AND with a related control vector and a master key stored in a master key storage mechanism 18. Thus, practical and highly flexible key management technology can be obtained.
-
-