AU706073B1 - Communications security and trusted path method and means - Google Patents

Communications security and trusted path method and means

Info

Publication number
AU706073B1
AU706073B1 AU30510/92A AU3051092A AU706073B1 AU 706073 B1 AU706073 B1 AU 706073B1 AU 30510/92 A AU30510/92 A AU 30510/92A AU 3051092 A AU3051092 A AU 3051092A AU 706073 B1 AU706073 B1 AU 706073B1
Authority
AU
Australia
Prior art keywords
data
key
encryption
message
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU30510/92A
Other versions
AU706073C (en
Inventor
Mark Stephen Anderson
Brendan Beahan
Ken Hayman
Damian Marriott
Lisa Nayda
Malcolm Stevens
John Desborough Yesberg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Commonwealth of Australia
Original Assignee
Commonwealth of Australia
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Commonwealth of Australia filed Critical Commonwealth of Australia
Priority to AU30510/92A priority Critical patent/AU706073C/en
Priority claimed from AU30510/92A external-priority patent/AU706073C/en
Publication of AU706073B1 publication Critical patent/AU706073B1/en
Application granted granted Critical
Publication of AU706073C publication Critical patent/AU706073C/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Description

Regulation 3.2
AUSTRALIA
PATENTS ACT 1990 COMPLETE SPECIFICATION FOR A STANDARD PATENT
ORIGINAL
Name of Applicant: THE COMMONWEALTH OF AUSTRALIA Actual Inventors: MARK STEPHEN ANDERSON, JOHN DESBOROUGH YESBERG, DAMIAN MARRIOTT, LISA NAYDA, KEN HAYMAN, MALCOLM STEVENS and BRENDAN BEAHAN Address for Service: R K MADDERN ASSOCIATES, 345 King William Street, Adelaide, South Australia, Australia Invention title: COMMUNICATIONS SECURITY AND TRUSTED PATH METHOD AND MEANS Details of Associated Provisional Application No. PK 9153 dated 5th November 1991 The following statement is a full description of this invention, including the best method of performing it known to us.
This invention relates to securing data from misappropriation, unauthorised change as well as ensuring the integrity of data that is prepared and communicated internally and externally ol' a data processing device or network, whether the network is trusted or not.
Background In the context of information technology (IT) security equates to confidentiality, integrity Add and availabilityAevery IT product and network has its own level of security. To achieve and maintain a particular level of security, the product or every element of a network will involve the implementation of one or more security functions, for example, control of access to the product or network, both physically and in the data sense, transaction auditing and detection and recovery from breaches of the security which is in place.
However, even if a particular level of security exists, there must also be a commensurate assurance in these security functions, i.e. confidence in the correctness of the security functions (development and operation functions) and confidence in the effectiveness of the security functions.
There exists a number of IT security evaluation criteria which address these security function issues, for example the Trusted Computer Systems Evaluation Criteria (TCSEC) "Orange Book" used by the US Department of Defence, the UK CESG3, the German ZSiEc as well as the Joint European Information Technology Security Evaluation Criteria (ITSEC).
To provide a realistic requirement for applying any form of security evaluation criteria there should also exist a realistic description of the operational requirements and the security threats that are to be countered (real world and assumed). These considerations along with the overall security objectives and well known security mechanisms becomes the security evaluation target of the IT security product or system that will be suitable for use in a security environment.
It is an aspect of this invention to provide an IT product which equals or exceeds the ITSEC security evaluation criteria level E6 which will allow the product to be used in a wide variety of security environments.
Page I a One such security target relates to the aim of providing an IT product which will allow the interconnection of networks with differing classification levels. For example, there is a defence requirement for top secret compartmented networks to be interconnected with secret networks (Fig. I) so that appropriately classified data unclassified to secret) may flow from the top secret network to the secret network while maintaining a bar to the flow of top secret data from the top secret network to the secret network. There must be a high level of assurance that both the hardware and software will not compromise data held in the top secret network by passing inappropriate data items to the secret network which includes the possibility of malicious logic trojan horses) or security flaws in computer hardware or software in the top secret network which may be used to leak data to the secret network.
One way of achieving the necessary assurance for the aforementioned target is to ensure that all computing equipment, hardware and software, is evaluated to an appropriate ITSEC level, in this case at least E6.
Due to the stringent nature of the evaluation criteria at E6 level, it is unlikely that a product of similar utility to that of, for example, a general purpose workstation which is classified as an untrusted device by all security evaluation criteria, could be made available. However, with the ever increasing complexity of the message content and level of communications between workers involved with classified material it is desirable that such equipment be available. Ideally, a product such as a workstation would meet the requirements of level E6 and still remain functionally similar to an untrusted workstation.
As well as complex data there is often the need to prepare for transmission, data which is seemingly of a simple nature, but for which the highest level of integrity is required. An example of a message which must have high integrity is of the nature of an order from a commander to "launch a missile at target 23511". The message must be verifiable as to its source and must have the highest level of integrity in respect of the content of the message.
Ideally there must exist a secure means of controlling the transfer of messages input to a display, so that only the message displayed which must be visually verified by the sender will be Page 2 transmitted, thereby ensuring the integrity of its content. This then leaves the user to be responsible for taking appropriate steps to verify themselves as a legitimate source of the message.
Thus it is a desirable aspect of security related devices when used with a non E6 level compliant (which for the purposes of this discussion is considered as untrusted) device, for example a workstation, to have provided a trusted path between the message input, the display, the human verifier, and the message output of the device. A trusted path for high integrity information is then created using elements of a previously untrusted devices and its normal f'unctions for their preparation.
However, having prepared a high integrity message, there still exist many security threats in relation to message interception and unauthorised interpretation. To counter these threats, apart from well known physical security measures, there exist a number of security functions which can be applied to the message itself, to remove or reduce these threats.
The most common and typically most easily applied is the use of an encryption algorithm, having a predetermined key. When the encrypted message is received at its destination, a decryption algorithm is applied using the same predetermined key to extract the original message.
There are many encryption and decryption algorithms, however, only the "one time pad" key system has an unquestionable assurance of confidence and effectiveness against unauthorised decryption. A "one time pad" system uses a random key for each matching data item sent.
Currently, this approach is only used in very limited circumstances and is impractical for widespread use, due to the unmanageable nature of the large number of keys that would be used and the difficulty of coordinating the use of the same random key at each end of the information exchange.
Thus it is a further desirable aspect of the invention to provide a data encryption device which uses the preferable "one time pad" encryption system, but which overcomes the mass Page 3 storage, coordination, and distribution problems of the typical implementation of this type of scheme while still meeting a security evaluation criteria level of E6 or greater.
Thus the combined use of data integrity and encryption elements would provide a message having a high integrity with regards to its content and unquestionable assurance that the message has not been decrypted.
The invention thus may comprise two devices, an encryption device and a trusted path device. A encryption device for encryption of an input data may comprise a mass storage device adapted to store a plurality of random keys for use in the encryption process as required.
A trusted path device may be incorporated or retrofitted to standard data processing 0 devices. The device will provide an assurance that various securityctical functions carried out by a user cannot be bypassed or tampered with by the hardware or software of the untrusted device which could otherwise compromise the function of the data processing device to which the trusted path device is attached.
In a broad aspect, the invention is a trusted path device for controlling the transfer of received data between an untrusted data input means, an untrusted visual display means adapted to display signals from an external source and a data output means, comprising, a trusted visual display interface control means for transferring said received data from said untrusted data input means to said untrusted visual display means and controlling said display to display said received data on said untrusted display, an untrusted verifier means having at least one user operable input signal actuator whereby a first signal output from said verifier means occurs upon actuation of a trusted first one of said actuators representative of a visual Page 4 verification by the user that the data displayed on said untrusted visual display means, is received data, and a trusted control means adapted for receiving verifier means output and upon receiving said first signal output transferring said received data to said data output means.
In a further broad aspect of the invention a trusted encryption device comprises a trusted control means, a trusted data input means for accepting received data comprising a data portion and a uniquely associated data string comprising a serial identifier, an untrusted mass storage means for retrievably storing a plurality of data items, said items comprising at least one encryption key part which is uniquely associated with a data string comprising a serial identifier, a trusted data string verifier means having at least two registers, a first register containing a current serial identifier and a second register containing a serial identifier bound, wherein said control means adapted to determine whether said serial identifier in said received data is within the range determined by said current serial identifier and said serial identifier bound, in which event said control means stores in said first register a current serial identifier calculated by incrementing said serial identifier in said received data a predetermined series increment towards said serial bound identifier, (ii) retrieves from said untrusted mass storage means a key part uniquely associated with said serial identifier in said received data, encrypting said data portion of said received data according to a predetermined encryption algorithm
~NIV
Page with said key part, and (iii) outputs an encrypted data portion having a uniquely associated said serial identifier.
In a further broad aspect of the invention a method of encrypting data comprises a method of encrypting data comprises the steps of a) storing a plurality of data items each comprising at least one encryption key, each of said keys being uniquely associated with a data string comprising a serial identifier in an untrusted mass storage device, b) storing a serial identifier bound in the first register of the trusted serial number verifier means, c) storing a current serial identifier in a second register of said trusted serial number verifier means, d) providing data input to a trusted control means comprising a data portion to be encrypted and a uniquely associated serial identifier, e) comparing in said trusted control means said serial identifier portion of said data input to said serial identifier to determine whether they are equal and whether said serial number portion is greater than or equal to said serial identifier bound, f) obtaining from said untrusted mass storage device a data item having an encryption key uniquely associated with said current serial identifier, g) adjusting said serial identifier in said received data a predetermined series increment towards said serial identifier bound, h) encrypting in said trusted control means said data portion of said data input uniquely associated with said current serial identifier, with a predetermined encryption algorithm using said random encryption key, and i) said trusted control means providing a data output comprising an encrypted data portion associated with said serial identifier.
Page 6 Brief Description of the Drawings Fig. 1 depicts an inter-network message exchange environment where unclassified to secret data may flow from a top secret network to a secret network; Fig. 2 depicts a functional block diagram of an encryption device; Fig. 3 depicts the structure of the main data items which comprise the data construction used on the worm drive; Fig. 4 depicts a functional block diagram of the Trusted Path Device; Fig. 5 depicts a functional block diagram of a controllable video switch device connected to a display monitor, a host, and a Stub device; and 11) Fig. 6 depicts a variant of the Trusted Path Device to which a Worm Key can be fitted and an alternative encryption device other than the one which appears in these specifications can be used.
Detailed Description of an Embodiment of the Invention Fig. 1 depicts network A which contains Unclassified to Top Secret information and it is 13 important that only Unclassified to Secret information is transferred to network B which is not authorised to process or store Top Secret information.
For the purposes of this description the term trusted device will be used to refer to a device which, while being used in the context of its security evaluation target, has or exceeds compliance with level E6 of the ITSEC standard, while the term untrusted device will be used to refer to a device if it or any part of it does not need to equal or exceed level E6 requirements. However, the choice of Level E6 of the ITSEC standard is a choice determined by the user of the invention and other standards and levels may be used as the environment determines.
Page 7 Encryption Device The purpose of the encryption apparatus depicted in Fig. 2 is to accept plain text data and output encrypted data. The device comprises three main elements, a key storage device 10, a serial number verifier 11, and an encryption device 12.
The key storage device 10 comprises in this embodiment an optical disk drive 18 and an optical disc 13 which contains a plurality of data items 14 (refer Fig. Each data item contains a key portion 15 comprising a random number (not pseudo random), a unique serial number 16 (e.g.
created from a number representation based on 64 bits of data) and a check sum 17 which is a suitable one-way function of the key portion 15 and unique serial number 16 and/or the checksum i0 is created from cipher block-chaining of the data item 14 and the successor data item. The optical disc 13 may be of a Write Once Read Many times (WORM) type so that used data keys can be permanently obliterated after use changed to 0000...0). However, this may be an optional ifeature, depending on the requirements of the particular environment in which the device operates, However, the permanent obliteration of used keys would be mandatory in some specialised security environments but not required in other environments.
Each key portion 15 maybe further decomposed into two logical items designated key first part 41 and key second part 42.
In another version of the encryption and trusted path devices, the key storage device need not store a serial number with every random key supplied thus allowing a higher density of key storage. For example, a serial number could be prefaced to a group of keys and checksums.
After this group could follow another serial number which forms the logical successor to the serial number which in the previous version would have appeared with the last key in the group.
An optical disc 13 is portable and small thereby easy to distribute and provides more than sufficient storage capacity for the quantity of keys to enable practical quantities of message or other data to be encrypted over an extended period by the keys stored thereon.
Page 8 The optical disc 13 is read using an untrusted conventional optical disc drive 18. It is a desirable aspect of the total encryption device that such an untrusted mass storage device can be used without impinging on the E6 compliance level of the device. It would be unduly difficult and expensive to construct a trusted E6 or greater compliant) disc drive.
One version of the invention requires the random key 15 itself to be encrypted before its storage on the optical drive 13. This extra level of encryption may be mandatory in some specialised security environments.
The serial number verifier 11 comprises in this embodiment, at least two serial number registers, a currently useable serial number and a serial number towards which the currently useable serial number may progress. In this embodiment there are three registers: register 19 contains an upper bound of predetermined serial numbers allocated to the verifier user; register contains the lower bound of predetermined serial numbers allocated to the verifier user, and register 21 contains the currently useable serial number.
Each of the serial numbers contained within the verifier is in plaintext.
The verifier 11 may contain several sets of registers with similar functions to 19, 20, and 21. However, the ranges specified by any two registers which have a function similar to 19 and must be disjoint.
The verifier 11 is a physically detachable device which can be plugged into the encryption device 12 and, in accordance with suitable physical security procedures, is issued, with its own unique register values, to one or more personnel. Register 19 and 20 may be resident in a ROM while register 21 may be resident on a nonvolatile random access memory (NVRAM). In an alternative version, the serial number verifier 11 has some of its contents encrypted. The items which are encrypted can comprise all of the contents.
If the contents of the verifier are encrypted, then alternative hardware technology may be used, for example, smart cards. This allows the primary interface to the smart card and the encryption device to be untrusted without impinging on the overall trust of the process or the Page 9 encryption device. No processing of unencrypted data takes place on the smart card. Hence in this alternative, the verifier can be untrusted.
Power to actuate the reading of these registers is derived from the encryption device 12 as is the power to overwrite the content of register 21 when the next serial number is being used.
The encryption device 12 comprises a key storage device interface 23 which in this embodiment is an interface and which is adapted to control and receive from the key storage device 10 data items 14 via the standard output of drive 18. Interface 23 may itself be an untrusted portion of the device.
The encryption device 12 further comprises a data input module 24 which is adapted to receive plain text data 25 comprising the entire message and an associated serial number 26 from the user of the encryption device. The untrusted host may supply the necessary serial number from a database and the user verifies it along with the message.
An alternative method of operation entails the use of serial number verifier 11 to supply the current serial number from register 21 each time text data is input to module 24. However, in this embodiment the serial number 26, since it is also in plain text, is passed unchanged to the storage device interface 3 via the crypto-processing module 27. This module 27 is responsible a da ed ptalI for a variety of functionsd--Fig. 2.
Upon receipt of a plain text serial number 26 the interface 23 commands the disc drive 18 to read not only data item 14 (Fig. 3) associated with that serial number but also obtains the successor data item and provides these two data items to the crypto-processing module 27 shown in Fig. 2 via module 47.
One of the variety of functions performed by module 27 is to check that the plain text serial number 26 is greater than or equal to the serial number 21 contained in the current serial number register, and less than the serial number 19, and greater than or equal to the serial number Page Another function performed in the crypto-processing module 27 is to determine whether the checksum 17 of data item 14 is as expected, to establish the integrity of the random encryption key 15 which is associated with serial number 16. Depending on the checksum algorithm used, calculation of this checksum may require the successor data item. In this embodiment of the invention, the checksum algorithm used does not require the successor data item.
The successor data item is typically a single increment of the series of serial identifiers, however, it may be a predetermined two timcor some other multiple times a single increment of the series of serial identifiers is e Wused. Generally, the increment is in a direction towards an upper bound of the serial identifier, however, it may also be towards a lower bound. Further more i0 in general the serial identifiers are a numeric series, however, they could be formed from any suitable series of identifiers alphas, alpha-numerics, etc.).
Having checked the integrity of the key 15, the current serial number register 21 is set to be the successor to the serial number 26. If the any of the aforementioned conditions are not met, the device signals the host to which it is attached that an error condition prevails and the encryption process is not completed. Each set of registers in the verifier 1j(until the appropriate conditions are met, or, in the case that no set of registers satisfies the conditions, .signalan error condition is signalled. The serial number 22, output from 29 is equal to the serial number 26.
In accord with another embodiment of the encryption device the key decrypt module 47 implements a decryption algorithm to decrypt the key 15 obtained from the optical disc.
The crypto-processing module 27 finally performs the function of encryption by a security-environment suitable algorithm using the key 15 with the data input 25 to produce encrypted data 28, which is provided to the user or any other suitable trusted or untrusted device or network, via the data output module 29. The particular encryption algorithm used may be of any predetermined kind of the many that are available. The complexity or otherwise of the algorithm is not crucial since in effect a "one time pad" key is being used.
Page II In this embodiment the simplest of bit wise exclusive-OR algorithms is used to provide an encrypted data 28. A simple algorithm is justified because of the use of a "one time pad" key and also, since it is advantageous to use simple logical operations in trusted devices.
The output from the encryption device 12 may include the serial number 16 along with the encrypted data 28.
The method of operation described thus far shall be known as mode A.
In a further operating mode, designated mode B, the crypto-processing module 27 first receives a serial number 26 via 24 and retrieves the associated key 15. The key second part 42 is then output by 29. The crypto-processing module 27 then receives the data input 25, encrypts the resultant bit string with the key first part 41, and then outputs via 29 the encrypted data 28 and serial number 16. The minimum number of bits in key first part 41 is dependant on the encryption algorithm used.The size of the key first part 41 must have an equal or greater than number of bits than the elements which are encrypted if the "one time pad" method of encryption is used. In this particular version of the embodiment of the invention, the number of bits in key first part is equal to the number of bits of the concatenation of the data 25 with the key second part 42.
Decryption of data can take place at a receiving device by simply proffering the data to the ciphertext device with the appropriate serial number and an instruction to operate in mode A.
The purpose of having a plurality of sets of registers in the serial number verifier 11 is to allow transmission and reception "bands". More precisely, a user can transmit text using one or more ranges of serial numbers, and can also receive from one or more ranges. It may be that a user would have one transmission range, and a separate and disjoint reception range for each user from which messages may be received. It is possible with the given arrangement of the ciphertext device formed by the components 10, 12, and 11 to set up hierarchical and flat access control policies In practical terms the encryption apparatus depicted in Fig. 2 comprises a collection of trusted and untrusted devices. By design, the only untrusted devices are the key storage device Page 12 aeld c;e& )t Ocd I.q the key storage interface 23 and, depending on the operating requirements, thf#eviee- used to supply the plain text input data at 2. and accept the encrypted data 28, serial number 16, or key second part 42 output from 29.
The remainder of the apparatus is trustable by virtue of its compliance to E6 level or greater in ITSEC. Such a compliance implies not only stringent design, mathematical, material, construction and operational standards, it also implies that such an apparatus will be used in accord with strictly enforced procedural guidelines.
In this embodiment, the previously described elements of the encryption device are controlled by a finite state automaton implemented in a set of programmable gate arrays, housed in physically tamper resistant assemblies and enclosures.
Trusted Path Device The data encryption device described above is of further worth if encryption of messages is used to provide confidentiality, but of limited worth if there is a risk that the message to be sent lacks an assurance that it is correct. That is, its contents must not have been changed in any unauthorised way, and must be correct in every detail, including its security level (classification assignment) and the authority (digital signature) by whom it is created and sent.
Therefore, there is also a need for a device upon or with which these types of messages can be created. Specialist devices built to the 1TSEC or other security level standards are available which provide a set of keys and symbols which are a subset of the myriad of keys and symbols used by security conscious personnel, some of whom are specialists in their fields, dealing with quite unique message content and formats scientific, engineering symbols, etc.). Ideally, the normal tools of trade such as maintenance terminals, workstations and personal computers would be better suited to creating these messages, however the task of producing an E6 level security device capable of operating in these myriad of applications and conditions is prohibitively difficult and/or expensive.
Page 13 Therefore there exists a need to provide a device which can interface with a standard iuntrusted device such as a work station and by controlling its display and certain inputs and outputs, provide a trusted path for the creation of a message which can be assured of having the necessary integrity to be a trusted message for transfer to a trusted network or a suitable encryption device, not necessarily a device of the type described previously, however ideal that may also be.
The device, referred to hereafter as a Trusted Path System (TPS) device, is implemented in this embodiment, by interposing a trusted device between the standard untrusted display of the computer and the computer itself used by the person compiling a message, as well as accepting the data which is input by the user so that it may control the output of the computer, and control what the computer displays, and therefore ensure that the user sees what they would expect to see if it were interacting with the display via an untrusted computer interface. The TPS device also has inputs and outputs which may be adapted to respectively receive and provide messages from and to an external message transmission network which may or may not require encryption processes to be applied to the message.
In normal operations using the untrusted computer device, the TPS device is transparent to the user. When the TPS is required for secure message creation or reception, the TPS device is activated for the reception of input data. The TPS device is configured to allow direct operator access to visual verification, using the untrusted devices' standard display and a User Input Module (Verifier) 39, which also provides the means to append message classification and digital signatures to the message. This verifier is quite different from that of the earlier described verifier 11 of Fig. 2. The earlier mentioned verifier is used in the described embodiment to verify the currency of a desired serial identifier (serial number) where as the present verifier is used to indicate the validity of a message displayed on a visual display.
Only data which is processed by the TPS device is therefore displayed and only that data is passed externally. This may be to an encryption device.
Thus, such a system allows untrusted computer devices to connect to trusted networks.
Page 14 Fig. 4 depicts both a) a nonbypassable, trusted communication path between the user of a computer to which the device is attached and security operations implemented in the TPS device and b) a trusted path to external devices and networks.
In this embodiment the trusted processing means is provided by a micromachine 32 which carries out specified security functions depending on inputs indicated from verifier 39. The micromachine 32 is controlled by a microcoded state machine.
The ram 33 is a static Random Access Memory for example, frame buffer contents.
The user input module 39 is a device with which a user can signal instructions to the micromachine 32. The micromachine 32 can also signal certain status indications to 39. In one application of the TPS device, the user input module 39 is implemented as a bank of switches and lights. Each switch is typically used exclusively by the user upon actuation by that user to provide a signal representative of one of a number of functions which may include, verification of the displayed message, provision of a predetermined unique user signature for use with the received data message or a predetermined data classification which maybe uniquely associated with for example the received data message.
The computer interface module 40 is an untrusted interface which may take data from a host computer to which it is connected and conducts message protocol and format translation for input to the micromachine 32 alternatively the micromachine may receive such input direct.
The computer interface module 35 is an untrusted interface which may connect and convert the message formats and protocols from the micromachine 32 to the host computer or network.
The input module 38 is used to receive information from an external device, for example, an encryption device, and convey it to the micromachine 32. Alternatively the module 38 may be adapted to receive data messages from external trusted and/or untrusted networks.
Page The output module 37 is used to convey data from the micromachine 32 to an external device, for example, an encryption device. Alternatively, the module 37 may be adapted to send data messages to external trusted and/or untrusted networks. In each case these devices are preferably trusted.
The display 36 is an untrusted frame buffer device which forms part of the display of the host computer. It accepts and transmits data to and from a trusted visual display interface in this example a Display Interface Override 46.
In one desirable application of the TPS device, data in the form of messages is received from the computer interface 40. The device calculates a tamperproof checksum for the message.
The checksum is then returned to the host computer through interface The micromachine 32, on receipt of a message through interface 40, instructs the display interface override module 46 to capture and store all data held in the display frame buffer 36 in the ram 33 via the micromachine 32. The micromachine 32 then instructs module 46 to place the message in the frame buffer 36 for display to the user. The user may then signal via module 39 whether the message meets the desired properties, typically as to whether the message is as was entered by the user and whether it is of an appropriate classification. Using module 39, the user can also signal to the micromachine 32 the desired classification of the message or append a predetermined digital signature.
The following series of steps can be implemented as part of the operation of a suitable encryption device, and in effect, decreases the reliance on the secrecy of the checksum algorithm implemented as part of the checking process associated with restricted message exchange.
The micromachine 32 may use a serial identifier preferably a serial number obtained from the host computer via 40 to obtain from the encryption device an associated key second part 42.
After concatenating the key second part 42 to the inputted message and any other data classification and/or signature, the micromachine 32 calculates a checksum for appending to the message key second part pair.
Page 16 The ram 33 may also be used for storage of intermediate values generated during the calculation of the checksum. The calculated checksum concatenated with the key second part 42 is passed to the encryption device via module 37 and the data input module 24 for encryption with the key first part 41. The encrypted checksum, key second part pair is returned to the host computer via the output module 35 and module 38. The micromachine 32 then restores the original display contents which were saved in the RAM 33.
If the previous optional steps are not implemented, then the following steps maybe taken.
The micromachine 32 calculates a checksum based on the serial number obtained from the host computer via 40 and the inputted message. This checksum is then passed to the external encryption device via the data input module 24 of Fig. 2 for encryption via module 37. The encrypted checksum is returned to the host computer via module 29 and output module 35. The micromachine then restores the original display contents which were saved in RAM 33.
The checksum algorithm used must be suitable for the task and must itself be kept secure.
The display of the message through the use of the TPS device which is constructed to have a greater than 1TSEC level E6, will enable the user to have a high level of assurance, that the message is as it appears on the display.
In order to verify the properties of the micromachine 32 to a high degree of assurance which exceeds ITSEC level E6, it is preferably implemented by a finite state automata in programmable gate arrays, including, for example, Read Only Memories.
The design of modules 32, 33, 37, 38, 39, and 46 require that their operations are verifiable to a level exceeding 1TSEC level E6. As a result, the assurance level of the TPS device as a whole can be evaluated to a level exceeding E6.
Since the display frame buffer 36 is under the control of the TPS device, the host computer cannot subvert the trusted path by attempting to display incorrect data when the user is made aware by the TPS device that it is displaying the data. However is theoretically possible for a hardware trojan horse to be implanted in the frame buffer device so that it can be triggered not to Page 17 display certain data when a specific code is given. Hence in the highest national security environments a trusted frame buffer may also be required.
Although it will be apparent to those skilled in the art that the principles described herein are applicable at any desirable level of security in respect of the hardware, and thus, although the very high ITSEC E6 level used as an example and the configurations described by way of example are configured for certain characteristics and requirements of this particular environment, it is also possible for these principles to be applied to lower levels and indeed future higher levels of security to ensure the correctness and effectiveness of the security these devices provide.
Furthermore, the worth and security of any Information Technology system is wholly dependent on the procedures and enforcement of physical security measures which must be applied in concert with the IT system at the users disposal.
Display Variant A variant to the display override is to construct a video switch 50 as depicted in Fig. 5 so that the TPS device 52 can command the switch to pass data from the trusted display frame buffer 57 in the TPS 52 rather than the host machine's 54 frame buffer 56.
In an embodiment of this variation to the invention the TPS controls a frame buffer video card 56 directly. The output from this card and the output of the host computer are both fed into the video switch unit 50. The output from the video switch is fed into a display monitor 58.
Typically, this will be the display monitor normally attached to the host computer 54. Typically, a fibre optic input to the video switch from the TPS 52 controls a bank of switch means typically relays which may be either electromechanical or solid state which connect either the hosts video output to the display monitor 58 or the TPS device's output. In this embodiment of the video switch provides four relays which are used to switch Red, Green, Blue, and Sync signals.
In a further variant of the video switch arrangement, the cables and interface circuitry can he changed to accommodate different cable and receptor plugs and the control input may not be Page 18 fibre optic, but rather electronic. The fibre optic solution was chosen for its superior resistance to unauthorised inductance coupling along the cable path to prevent unauthorised control of the switch In another embodiment of the invention, a multi throw relay may be used to switch as many signals as required, whether they be RGBS, RGBH (Horizontal)V(Vertical), RGB, Composite, or any other format. In addition, the video switch may be implemented physically as part of the TPS 52.
The video switch mechanism has the advantage of allowing different frame buffers developed by different manufacturers to be employed. It also can remove the need to store the contents of the display screen. However, use of the video switch can cause the overall TPS device and system to be more expensive than a TPS device with an override mechanism unless large production quantities are considered.
Trusted Path Variants Micromachine Variant In another embodiment of the invention, the micromachine state register 48 is implemented as a bit slice microprocessor that receives microinstructions from the microword roms 30 and 31. The microprocessor comprises bit slice ALU chips that can be obtained commercially, and control units which comprise programmable logic chips or a construct of fixed, random logic. In this variant, the contents of the rom 30 and 31 would be different so as to reflect the different control and data paths. Other obvious variants would be the removal of either rom or rom 31 so as to have a single, logical bank of rom. The purpose of having two separate roms is to aid in the verification process but is not strictly necessary. This also applies to the earlier version of the TPS device.
Although the bit slice microprocessor design can be verified to a level exceeding E6, it would be relatively less trusted than a finite state automaton design implemented in FPGA's or other programmable logic comprising chips such as Xilinx gate arrays.
Page 19 'ITPS Device Fitted With an Alternative Crypto Engine The TPS Device can be made to operate with many types of encryption device, one example of this variant is depicted in Fig. 6.
In this variant, device 11 (referred to as a Worm Key) is a physically detachable module which can be connected to the TPS device 32 in a similar manner to module 39. The contents of the Worm Key comprise in addition to a plurality of data items as previously described in relation to the encryption device, a set of random numbers called K numbers. The purpose of these numbers is similar to the Key Second Part 42. There exists a K number for each valid serial number spanned by the range of serial numbers defined by the current 21 and upper 19 or lower 20 serial numbers in their respective registers.
In this variant, the Trusted Path device takes on part of the role of the encryption device 12 of Fig. 2 by checking the Worm Key 11. The Trusted Path device updates the Worm Key, deletes the K number corresponding to the given serial number, and proceeds to calculate a checksum based on the concatenated message and K number. The resultant checksum is encrypted by passing it to the crypto engine. Note that the K number is not displayed or output from the TPS in any form. The key used by the crypto engine for encryption purposes is supplied by some mechanism indigenous to the particular implementation of that device.
In yet another variant, no K number is stored on the Worm Key, and no K number is used as part of the checksum calculation process. The TPS device checks and updates the Worm Key given an appropriate serial number, but then proceeds to merely calculate the checksum based on the message and other data, typically the classification supplied by the user and the serial number input with the message. The checksum is then encrypted using a key input by some mechanism indigenous to the implementation of the crypto engine. In this variant or others the crypto engine is not restricted to the use of a symetric encryption algorithm; the use of an Qs mmic algorithm such as public key is not precluded.
The crypto engine is used simply as an encryption service; no serial numbers are passed to it.
Page The contents of the Worm Key 11 can be encrypted in order to provide further security from theft and attempted misuse by unauthorised personnel. The one or more keys needed to decrypt the contents of the Worm Key 11 would be stored either in the rom 30 or rom 31, the ram memory 33, inside the crypto engine, or some specialised device which can be attached to the encryption engine.
Both the methods of encrypting the resultant checksum allow selective, transitive, and temporal granting and revocation of privileges.
For example, a range of serial numbers can represent the granting of the privilege to send, receive, or authenticate a specified quantity of messages. These messages can represent different commands or information such as the permission to transfer a certain quantity of funds. Each range of serial numbers can represent a different privilege to undertake some action.
By judicious distribution of serial number ranges, exclusive messages can be sent. More precisely, if two entities only have access to the same range of serial numbers, then only they can encrypt and decrypt data transformed using that range.
Page 21
AU30510/92A 1991-10-29 1992-10-28 Communications security and trusted path method and means Ceased AU706073C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU30510/92A AU706073C (en) 1991-10-29 1992-10-28 Communications security and trusted path method and means

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AUPK915391 1991-10-29
AUPK9153 1991-11-05
AU30510/92A AU706073C (en) 1991-10-29 1992-10-28 Communications security and trusted path method and means

Publications (2)

Publication Number Publication Date
AU706073B1 true AU706073B1 (en) 1999-06-10
AU706073C AU706073C (en) 2000-09-07

Family

ID=

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1486430A (en) * 1973-09-10 1977-09-21 Computer Automation Memory system for digital computers
EP0174016A2 (en) * 1984-09-07 1986-03-12 Casio Computer Company Limited Identification card and authentication system therefor
EP0246823A2 (en) * 1986-05-22 1987-11-25 Racal-Guardata Financial Systems Limited Data communication systems and methods

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1486430A (en) * 1973-09-10 1977-09-21 Computer Automation Memory system for digital computers
EP0174016A2 (en) * 1984-09-07 1986-03-12 Casio Computer Company Limited Identification card and authentication system therefor
EP0246823A2 (en) * 1986-05-22 1987-11-25 Racal-Guardata Financial Systems Limited Data communication systems and methods

Similar Documents

Publication Publication Date Title
US6836548B1 (en) Communications security and trusted path method and means
US5319705A (en) Method and system for multimedia access control enablement
US4326098A (en) High security system for electronic signature verification
US4747139A (en) Software security method and systems
US5369707A (en) Secure network method and apparatus
EP0976049B1 (en) Method and apparatus for controlling access to encrypted data files in a computer system
CN103152173B (en) System and method for remote device registration
US5832228A (en) System and method for providing multi-level security in computer devices utilized with non-secure networks
US7783887B2 (en) Method and apparatus for providing television services using an authenticating television receiver device
US7540018B2 (en) Data security for digital data storage
EP0534419A2 (en) Public key cryptosystem key management based on control vectors
US6981156B1 (en) Method, server system and device for making safe a communication network
JPH08273011A (en) Method for discrimination of measured account value to digital printer
CN1496073B (en) Information check equipment
EP1129541A1 (en) Method and system for authenticating and utilizing secure resources in a computer system
CN103996117B (en) Safe mobile phone
CN101036096B (en) Method and system for enciphering and deciphering operation
CN103390124A (en) Device, system, and method of secure entry and handling of passwords
CN112069555B (en) Safe computer architecture based on double-hard-disk cold switching operation
Mavrovouniotis et al. Hardware security modules
CA2271178A1 (en) Server-side public key cryptography apparatus with private key protection and isolation from public networks
Smith et al. An experimental application of cryptography to a remotely accessed data system
JPH09200194A (en) Device and method for security communication
CN107733936A (en) A kind of encryption method of mobile data
AU706073B1 (en) Communications security and trusted path method and means

Legal Events

Date Code Title Description
DA2 Applications for amendment section 104
DA3 Amendments made section 104

Free format text: 12081999

DA3 Amendments made section 104

Free format text: FT="THE" NATURE OF THE AMENDMENT IS AS WAS NOTIFIED IN THE OFFICIAL JOURNAL DATED 20000203