CN101986596B - Key management mechanism - Google Patents

Key management mechanism Download PDF

Info

Publication number
CN101986596B
CN101986596B CN201010515064.7A CN201010515064A CN101986596B CN 101986596 B CN101986596 B CN 101986596B CN 201010515064 A CN201010515064 A CN 201010515064A CN 101986596 B CN101986596 B CN 101986596B
Authority
CN
China
Prior art keywords
key
composition
encryption device
administrator
cryptographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201010515064.7A
Other languages
Chinese (zh)
Other versions
CN101986596A (en
Inventor
刘平
徐强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI JIANGNAN INFORMATION SAFETY ENGINEERING TECHNOLOGY CENTER
Original Assignee
WUXI JIANGNAN INFORMATION SAFETY ENGINEERING TECHNOLOGY CENTER
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI JIANGNAN INFORMATION SAFETY ENGINEERING TECHNOLOGY CENTER filed Critical WUXI JIANGNAN INFORMATION SAFETY ENGINEERING TECHNOLOGY CENTER
Priority to CN201010515064.7A priority Critical patent/CN101986596B/en
Publication of CN101986596A publication Critical patent/CN101986596A/en
Application granted granted Critical
Publication of CN101986596B publication Critical patent/CN101986596B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the field of computer information security, and discloses a safe and convenient key management mechanism. The key management mechanism comprises the following steps: firstly, primitively initializing cryptographic equipment in an initial state, and then generating an equipment signature key and an administrator signature key; issuing all administrator certificates, and then generating a backup key, a backup equipment key and a memory equipment key to finish primitive initialization; and electrifying for initializing the cryptographic equipment in a ready state. By adopting the technical scheme, the key management mechanism ensures key safety management, and ensures key safety use by explaining the initialization mode and process through various types of key initialization, thus solving the problem of realizing the safety and reliability of the cryptographic equipment in terms of key management and use.

Description

Key management method
Technical field
The present invention relates to field of computer information security, relate in particular to a kind of being applied to take PKI technology in basic information safety devices, to guarantee safe, the key management mechanism easily of key management in this equipment.
Background technology
At present, take PKI technology in basic information safety devices, grow existing key management undesirable, the use that occurs device keys cannot reach and meet the not requirement to application open system, key does not produce and stores by safe method; Key except PKI often there will be with plaintext form and appears at outside encryption device; The key of encryption device storage inside does not possess effective key protection mechanism, the phenomenon that there will be stranger to dissect, survey and illegally read; The key of encryption device storage inside does not possess mechanism of authorization control based simultaneously, often occurs illegal use and illegal situation about deriving; In a word, cannot there is a kind of available strategy of key management.
Summary of the invention
The use that the present invention is directed to the device keys existing in prior art cannot meet the requirements of the customers, and cannot solve encryption device in key management and use the problem of fail safe, and a kind of safe, key management mechanism is easily provided.
In order to solve the problems of the technologies described above, the present invention is solved by following technical proposals:
One, first set forth classification and the effect of lower key:
Two, general, in system, there are five class keys, wherein 1~4 key for management use, is mainly used in key management, and 5 keys of using for work, are mainly applications cryptographic service are provided:
Three, 1, device keys: the key of asymmetric arithmetic is the identity key of encryption device, for the information exchange of administrative center, sign and issue administrator certificate and authentic administrator signature.
2, keeper's signature key: the key of asymmetric arithmetic, one of each keeper, for keeper's authentication and operation signature.
3, cipher key backup key: 128 symmetric keys, for by device keys, user job cipher key backup outside encryption device, when multiple encryption device co-operation, this key can be as synchronisation key.
4, cryptographic key protection key: the symmetric key of 2 128, for device keys, user job key and cipher key backup key are encrypted to storage in encryption device.
5, user job key: user job key comprises symmetry algorithm key and asymmetric arithmetic key, is used to host that the crypto-operation services such as data encrypting and deciphering, data compression, digital signature, digital envelope are provided.
Two, key management mechanism, the step of described key management is as follows:
1, key management method, is characterized in that: the step of described key management is as follows:
First step: the encryption device under initial condition is carried out to original initialization, remove all keys in encryption device key storage district, generate the symmetric key that is called composition 1 and composition 2 of 2 128, composition 1 is deposited in to the key storage district of encryption device, form cryptographic key protection key composition 1, composition 2 is temporary in internal memory, forms cryptographic key protection key composition 2;
Second step: reproducing device signature key, generate a pair of public and private key and be deposited into as the signature key of equipment the signature key memory block of this this key, to devices encrypt key storage district, allow encryption device in ready state device subscription phase-key replication;
Third step: regeneration keeper signature key, on the password storage medium of supporting asymmetric cryptographic algorithm, produce a pair of public and private key as keeper's signature key, the PKI of keeper's signature key is signed and issued into administrator certificate by device subscription private key, and the composition of administrator certificate and Protective Key 2 is downloaded in administrator's password storage medium;
The 4th step: repeat third step, sign and issue out all administrator certificate, then remove the cryptographic key protection key composition 2 in internal memory;
The 5th step: regeneration cipher key backup key, remove the user job key storage district of encryption device, then generate 128 symmetric keys as cipher key backup key, deposit in the memory block of cipher key backup key, this key is divided into three parts by secret shared mechanism, three key compositions are encrypted separately with three custodians' password respectively, and ciphertext hands over three custodians to preserve;
The 6th step: carry out alternate device key, recall the composition 2 of the cryptographic key protection key in administrator's password storage medium, add with cipher key backup key mould two, its result is as the key of symmetry algorithm, encryption device key, and encrypted result is preserved separately, device keys is the key of asymmetric arithmetic, the identity key of encryption device, for the information exchange of administrative center, sign and issue administrator certificate and authentic administrator signature;
The 7th step: carry out again memory device key, recall the composition 2 of the cryptographic key protection key in administrator's password storage medium, add with cryptographic key protection key composition 1 mould two in encryption device key storage district, its result is as the key of symmetry algorithm, encryption device key and cipher key backup key, to ciphertext do verification and, deposit encryption device key storage district in together with ciphertext, so far original initialization completes;
The 8th step: allow and complete above-mentioned steps, encryption device in ready state carries out power-up initializing, first to check device keys in encryption device key storage district and cipher key backup key verification and, if checksum error, repeat above-mentioned 1-7 step and recover initialization, if verification and correct, recall the composition 2 of the cryptographic key protection key in administrator's password storage medium, add with cryptographic key protection key composition 1 mould two in encryption device key storage district, its result is as the key of symmetry algorithm, all keys in clear crytpographic key device keys memory block are to internal memory, so far complete power-up initializing.
According to technical scheme of the present invention, composition and the application mode of all kinds of keys are set forth, guarantee the correct use of key, the step and method of key management is described by the differentiated control of key, set forth the security mechanism of key in generation, derivation, importing and during Destruction, guarantee the safety management of key, by the initialized mode of all kinds of initializing declarations and the process of key, guarantee the safe handling of key, arrive a safe and reliable difficult problem thereby solve encryption device in key management and use.
Accompanying drawing explanation
Fig. 1 a carries out original initialized process step schematic diagram to the encryption device under initial condition in the present invention;
Fig. 2 a is the process step schematic diagram that carries out power-up initializing in the present invention to carrying out original initialized encryption device;
Fig. 3 a recovers initialized process step schematic diagram to carrying out original initialized encryption device in the present invention.
Embodiment
Below in conjunction with accompanying drawing and embodiment, the present invention is described in further detail
Embodiment 1
Key management mechanism, as shown in Fig. 1 a, Fig. 2 a and Fig. 3 a, step is as follows:
Key management mechanism, the step of described key management is as follows:
First step: the encryption device under initial condition is carried out to original initialization, remove all keys in encryption device key storage district, generate the symmetric key that is called composition 1 and composition 2 of 2 128, the key storage district that composition 1 is deposited in to encryption device, composition 2 is temporary in internal memory;
Second step: reproducing device signature key, generate a pair of public and private key and be deposited into as the signature key of equipment the signature key memory block of this key, to devices encrypt key storage district, allow encryption device in ready state device subscription phase-key replication;
Third step: regeneration keeper signature key, on the password storage medium of supporting asymmetric cryptographic algorithm, produce a pair of public and private key as keeper's signature key, its PKI is signed and issued into administrator certificate by device subscription private key, and the composition of administrator certificate and Protective Key 2 is downloaded in administrator's password storage medium;
The 4th step: repeat third step, sign and issue out all administrator certificate, then remove the cryptographic key protection key composition 2 in internal memory;
The 5th step: regeneration cipher key backup key, remove the user job key storage district of encryption device, then generate 128 symmetric keys as cipher key backup key, deposit in the memory block of this key, this key is divided into three parts by secret shared mechanism, three key compositions are encrypted separately with three custodians' password respectively, and ciphertext hands over three custodians to preserve; The 6th step: carry out alternate device key, recall the composition 2 of the cryptographic key protection key in administrator's password storage medium, add with cipher key backup key mould two, its result is as the key of symmetry algorithm, encryption device key, and encrypted result is preserved separately, device keys is the key of asymmetric arithmetic, the identity key of encryption device, for the information exchange of administrative center, sign and issue administrator certificate and authentic administrator signature;
The 7th step: carry out again memory device key, recall the composition 2 of the cryptographic key protection key in administrator's password storage medium, add with cryptographic key protection key composition 1 mould two in encryption device memory block, its result is as the key of symmetry algorithm, encryption device key and cipher key backup key, to ciphertext do verification and, deposit encryption device key storage district in together with ciphertext, so far original initialization completes;
The 8th step: allow and complete above-mentioned steps, encryption device in ready state carries out power-up initializing, first to check device keys in encryption device key storage district and cipher key backup key verification and, if checksum error, repeat above-mentioned 1-7 step and recover initialization, if verification and correct, recall the composition 2 of the cryptographic key protection key in administrator's password storage medium, add with cryptographic key protection key composition 1 mould two in key storage district, its result is as the key of symmetry algorithm, all keys in decruption key memory block are to internal memory, so far complete power-up initializing.
As preferably, the recovery initialization of described the 8th step, is can only be at encryption device under initial condition, and has at least an intact administrator's password storage medium to carry out, and follow these steps to carry out continuously:
First step: remove all keys in encryption device key storage district, generate 2 symmetric keys of 128 that are called composition 1 and 2, composition 1 is deposited in the key storage district of encryption device, and composition 2 is thrown aside;
Second step: carry out the recovery of cipher key backup key, get any two in three compositions of cipher key backup key, with custodian's password deciphering, two compositions after deciphering are synthesized to complete cipher key backup key, deposit in the memory block of this key;
Third step: carry out device keys recovery, recall the composition 2 of the cryptographic key protection key in administrator's password storage medium, add with cipher key backup key mould two, its result is as the key of symmetry algorithm, the device keys of deciphering backup, the memory block that is deposited in this key, then encryption device is in ready state;
The 4th step: carry out memory device key; recall the composition 2 of the cryptographic key protection key in administrator's password storage medium; add with cryptographic key protection key composition 1 mould two in key storage district; its result is as the key of symmetry algorithm; encryption device key and cipher key backup key, to ciphertext do verification and, deposit the key storage district of encryption device in together with ciphertext; so far, recovering initialization completes.
Embodiment 2
Elaborate some features of key and conversion step to guarantee the safety management of key according to figure below, by the initialized mode of all kinds of initializing declarations and the process of key, guarantee the safe handling of key, arrive a safe and reliable difficult problem thereby solve encryption device in key management and use.
One, the generation of key and storage:
1, device keys: its signature key is to being produced by encryption device when the original initialization, and after this key produces, encryption device is in ready state.Under this state, whenever all can derive its PKI to certificate verification mechanism application certificate.Devices encrypt key is to being produced by external key administrative center, and its private key does digital envelope protection by device subscription PKI, can download in encryption device.Device keys is stored in the key storage district of encryption device with cryptographic key protection secret key encryption.
2, keeper's signature key: produced by administrator's password storage medium in the time of original initialization, its PKI exports in encryption device by device subscription private key its grant a certificate.3, cipher key backup key: produced by encryption device in the time of original initialization, encrypt and be stored in the key storage district of encryption device.
4, cryptographic key protection key: 2 compositions, composition 1 produces in the time of original initialization or recovery initialization, is stored in the key storage district of encryption device; Composition 2 is produced by encryption device in the time of original initialization, is stored in administrator's password storage medium.
Two, the backup of key and recovery:
Pass key-encrypting key in encryption device need backup so that the key in encryption device damage or more renew encryption device time, recover in time key.
In encryption device, need the key of backup to be: cipher key backup key, device keys, user job key.
When many encryption devices are made cluster service, device keys, user job key need to be consistent in many encryption devices, and the operation that realizes this function is called key synchronization.Key synchronization is also used the backup of key and Restoration Mechanism to realize.Cipher key backup key: be made into 3 compositions by secret shared mechanism, use respectively after 3 custodians' password encryption, by custodian's keeping, realize the backup of this key; When recovery, need the composition of any 2 custodians keeping, with after corresponding password deciphering, in encryption device, synthetic complete key, realizes the recovery of this key.Other key: with the composition 2 of the cryptographic key protection key in administrator's password storage medium, add with cipher key backup key mould two, its result, as the key of symmetry algorithm, is encrypted the key that needs backup, and ciphertext stores in medium, realizes the backup of these keys; When recovery, with identical way generation key, to the key decrypt ciphertext in medium, realize the recovery of these keys.
Three, the renewal of key and cancelling
The composition 2 of device keys, cipher key backup key and cryptographic key protection key can not upgrade and cancel, unless carried out original initialization.
The composition 1 of cryptographic key protection key can upgrade in the time recovering initialized, but can not cancel.
User job key can add by call number, upgrade and cancel.
Four, the initialization of key
The initialization of key is mainly used in generation and the installation of key, is divided into original initialization, recovers initialization and power-up initializing.Original initial work comprises: in encryption device, generate device keys, generate administrator certificate, generate cipher key backup key and cryptographic key protection key, store the secret key encryption of generation into key storage district, and back up.Recovery initial work comprises: recover cipher key backup key, recover previously each key of backup, and the secret key encryption after recovering is stored in key storage district.The work of power-up initializing comprises: from key storage district, read ciphertext the deciphering of cipher key backup key, user job key, be stored in the key storage district of internal memory.
In a word, the foregoing is only preferred embodiment of the present invention, all equalizations of doing according to the present patent application the scope of the claims change and modify, and all should belong to the covering scope of patent of the present invention.

Claims (1)

1. key management method, is characterized in that: the step of described key management is as follows:
First step: the encryption device under initial condition is carried out to original initialization, remove all keys in encryption device key storage district, generate the symmetric key that is called composition 1 and composition 2 of 2 128, composition 1 is deposited in to the key storage district of encryption device, form cryptographic key protection key composition 1, composition 2 is temporary in internal memory, forms cryptographic key protection key composition 2;
Second step: reproducing device signature key, generate a pair of public and private key and be deposited into as the signature key of equipment the signature key memory block of this key, to devices encrypt key storage district, allow encryption device in ready state device subscription phase-key replication;
Third step: regeneration keeper signature key, on the password storage medium of supporting asymmetric cryptographic algorithm, produce a pair of public and private key as keeper's signature key, the PKI of keeper's signature key is signed and issued into administrator certificate by device subscription private key, and the composition of administrator certificate and Protective Key 2 is downloaded in administrator's password storage medium;
The 4th step: repeat third step, sign and issue out all administrator certificate, then remove the cryptographic key protection key composition 2 in internal memory;
The 5th step: regeneration cipher key backup key, remove the user job key storage district of encryption device, then generate 128 symmetric keys as cipher key backup key, deposit in the memory block of cipher key backup key, this key is divided into three parts by secret shared mechanism, three key compositions are encrypted separately with three custodians' password respectively, and ciphertext hands over three custodians to preserve;
The 6th step: carry out alternate device key, recall the composition 2 of the cryptographic key protection key in administrator's password storage medium, add with cipher key backup key mould two, its result is as the key of symmetry algorithm, encryption device key, and encrypted result is preserved separately, device keys is the key of asymmetric arithmetic, the identity key of encryption device, for the information exchange of administrative center, sign and issue administrator certificate and authentic administrator signature;
The 7th step: carry out again memory device key, recall the composition 2 of the cryptographic key protection key in administrator's password storage medium, add with cryptographic key protection key composition 1 mould two in encryption device key storage district, its result is as the key of symmetry algorithm, encryption device key and cipher key backup key, to ciphertext do verification and, deposit encryption device key storage district in together with ciphertext, so far original initialization completes;
The 8th step: allow and complete above-mentioned steps, encryption device in ready state carries out power-up initializing, first to check device keys in encryption device key storage district and cipher key backup key verification and, if checksum error, repeat above-mentioned 1-7 step and recover initialization, if verification and correct, recall the composition 2 of the cryptographic key protection key in administrator's password storage medium, add with cryptographic key protection key composition 1 mould two in encryption device key storage district, its result is as the key of symmetry algorithm, all keys in clear crytpographic key device keys memory block are to internal memory, so far complete power-up initializing.
CN201010515064.7A 2010-10-21 2010-10-21 Key management mechanism Expired - Fee Related CN101986596B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010515064.7A CN101986596B (en) 2010-10-21 2010-10-21 Key management mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010515064.7A CN101986596B (en) 2010-10-21 2010-10-21 Key management mechanism

Publications (2)

Publication Number Publication Date
CN101986596A CN101986596A (en) 2011-03-16
CN101986596B true CN101986596B (en) 2014-06-25

Family

ID=43710902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010515064.7A Expired - Fee Related CN101986596B (en) 2010-10-21 2010-10-21 Key management mechanism

Country Status (1)

Country Link
CN (1) CN101986596B (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932140A (en) * 2012-11-20 2013-02-13 成都卫士通信息产业股份有限公司 Key backup method for enhancing safety of cipher machine
EP2932644B1 (en) * 2013-01-07 2019-04-24 Acano (UK) Limited Secrets renewability
CN103475474B (en) * 2013-08-28 2017-02-08 华为技术有限公司 Method for providing and acquiring shared enciphered data and identity authentication equipment
CN103580855B (en) * 2013-11-07 2017-01-18 江南大学 Usbkey management method based on sharing technology
CN104753661A (en) * 2013-12-30 2015-07-01 上海格尔软件股份有限公司 Secret key description file for commercial code equipment
CN104219044B (en) * 2014-09-22 2017-12-26 杭州华澜微电子股份有限公司 A kind of key secret method for being used to encrypt storage device
CN105553661B (en) * 2014-10-29 2019-09-17 航天信息股份有限公司 Key management method and device
CN105656621A (en) * 2014-11-12 2016-06-08 江苏威盾网络科技有限公司 Safety management method for cryptographic device
CN105933113A (en) * 2016-06-13 2016-09-07 北京三未信安科技发展有限公司 Secret key backup recovering method and system, and related devices
CN106330868B (en) * 2016-08-14 2019-11-26 北京数盾信息科技有限公司 A kind of high speed network encryption storage key management system and method
CN106781789A (en) * 2016-11-18 2017-05-31 广东小天才科技有限公司 The changing method and device of a kind of video classes, user equipment
CN108418677B (en) * 2017-02-09 2021-01-15 杭州海康威视数字技术股份有限公司 Key backup and recovery method and device
CN107682355B (en) * 2017-10-27 2018-12-18 北京深思数盾科技股份有限公司 Data guard method and device, data reconstruction method and device
CN109088729B (en) * 2018-09-28 2021-03-26 北京金山安全软件有限公司 Key storage method and device
CN109495247A (en) * 2018-11-21 2019-03-19 北京深思数盾科技股份有限公司 Cipher key backup, the method for recovery and encryption equipment
CN109934013B (en) * 2019-03-21 2021-01-08 北京纬百科技有限公司 Data protection method and device
KR20210017268A (en) 2019-08-07 2021-02-17 삼성전자주식회사 Electronic device operating encryption for user data
CN111200602B (en) * 2019-12-30 2021-07-13 北京深思数盾科技股份有限公司 Rights-sharing management method, encryption card, administrator lock and cipher machine
CN112738083B (en) * 2020-12-28 2023-05-19 福建正孚软件有限公司 System and method for managing secure access key based on cross-network and cross-border data transmission
CN113382001B (en) * 2021-06-09 2023-02-07 湖南快乐阳光互动娱乐传媒有限公司 Communication encryption method and related device
CN113541937A (en) * 2021-06-25 2021-10-22 华东师范大学 Cipher key management method based on cipher strategy

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558580A (en) * 2004-02-03 2004-12-29 胡祥义 A network data safety protection method based on cryptography

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7693286B2 (en) * 2004-07-14 2010-04-06 Intel Corporation Method of delivering direct proof private keys in signed groups to devices using a distribution CD

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558580A (en) * 2004-02-03 2004-12-29 胡祥义 A network data safety protection method based on cryptography

Also Published As

Publication number Publication date
CN101986596A (en) 2011-03-16

Similar Documents

Publication Publication Date Title
CN101986596B (en) Key management mechanism
CN106548345B (en) Method and system for realizing block chain private key protection based on key partitioning
CN106330868B (en) A kind of high speed network encryption storage key management system and method
CN106789052B (en) Remote key issuing system based on quantum communication network and use method thereof
CN100417064C (en) Information processing system and its method, information recording medium and ,program providing medium
CN103580855B (en) Usbkey management method based on sharing technology
CN105323070B (en) A kind of safety E-mail implementation method based on digital envelope
CN101640590B (en) Method for obtaining a secret key for identifying cryptographic algorithm and cryptographic center thereof
CN101515319B (en) Cipher key processing method, cipher key cryptography service system and cipher key consultation method
US20100005318A1 (en) Process for securing data in a storage unit
CN101989984A (en) Electronic document safe sharing system and method thereof
CN102075544A (en) Encryption system, encryption method and decryption method for local area network shared file
CN105656621A (en) Safety management method for cryptographic device
CN102236756A (en) File encryption method based on TCM (trusted cryptography module) and USBkey
CN103236930A (en) Data encryption method and system
CN107154848A (en) A kind of data encryption based on CPK certifications and storage method and device
CN102299793A (en) Certificate authentication system based on trusted computing password support platform
CN111625852A (en) Electronic signature method based on document and user private key under hybrid cloud architecture
CN111815815B (en) Electronic lock safety system
CN107911221B (en) Key management method for secure storage of solid-state disk data
TWI476629B (en) Data security and security systems and methods
CN102811124B (en) Based on the system Authentication method of two card trigram technology
CN102769525B (en) The user key backup of a kind of TCM and restoration methods
CN111815810A (en) Safe unlocking method and device for electronic lock
CN1953366B (en) Password management method and system for intelligent secret key device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140625

Termination date: 20191021

CF01 Termination of patent right due to non-payment of annual fee