GB2270446A - Establishing a common cryptographic key at two cryptographic sites - Google Patents

Establishing a common cryptographic key at two cryptographic sites Download PDF

Info

Publication number
GB2270446A
GB2270446A GB9218816A GB9218816A GB2270446A GB 2270446 A GB2270446 A GB 2270446A GB 9218816 A GB9218816 A GB 9218816A GB 9218816 A GB9218816 A GB 9218816A GB 2270446 A GB2270446 A GB 2270446A
Authority
GB
United Kingdom
Prior art keywords
site
key
data record
card
test pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB9218816A
Other versions
GB2270446B (en
GB9218816D0 (en
Inventor
Christopher J Holloway
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
IBM United Kingdom Ltd
Original Assignee
IBM United Kingdom Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IBM United Kingdom Ltd filed Critical IBM United Kingdom Ltd
Priority to GB9218816A priority Critical patent/GB2270446B/en
Publication of GB9218816D0 publication Critical patent/GB9218816D0/en
Publication of GB2270446A publication Critical patent/GB2270446A/en
Application granted granted Critical
Publication of GB2270446B publication Critical patent/GB2270446B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/26Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The method includes preparing a portable data processing device ("smart card") at each site having a first data record which can only be read at that site but which can be written to at any site, and a second data record which can only be written at that site but which can be read at any site, the device also containing a testable key particular to that device. Each site also creates and publishes a set of test patterns against which the authenticity of the card can be verified. Each site then creates one part of the key to be agreed upon, and a test pattern for that key part. The test pattern is written to the site's own smart card in the second data record. The cards are exchanged, and the received cards are tested for authenticity using the published test patterns. Once accepted as genuine, the test pattern for the key part of the other site is read and stored. The key part previously generated is written onto the first data record of the received card. The cards are exchanged again. The key part is read at the home site of the card. The key part is verified for authenticity against the stored test pattern which was received earlier. Each site then combines the received key part with the locally created key part and they now share a common key.

Description

IMPROVEMENTS IN CRYPTOGRAPlI? this invention relates to a method of establishing a common cryptographic key at two cryptographic sites.
In general, cryptography has used i-hree main forms of algorithm: Hashing Algorithms - these are one way functions which require no secret keys to be distributed.
Public Key Algorithms - these flre asymmetric key systems which have the advantage for the initial distrihtion of keys that the distributed key may be published. As there is no reqIlirement for secrecy, initial keys may be exchanged between previollFly l3nknosçn systems without the need for a channel of secrecy (for example trllsted couriers).
Symmetric Key Algorithms - these algorithm6 require that the same secret key is held by both the sender and receiver of messages. The exchange of of initial secret keys between previously unknown systems has in the state of the art always been relatively expensive, because it has required a channel of secrecy as well as of integrity to exchange these initial keys.
It has been proposed that by providing public key cryptcgraphy to manage the initial keys of symmetric key algorithms, the problem of key exchange may be addressed. However, this requires a system supporting both algorithms in a closely integrated and secure environment, comnlonly known as a hybrid scheme.
It is therefore an object of this invention to pro-vide a new approach to the distribution of initial symmetric keys that does not; require the use of hybrid cryptographic systems or trusted ccuriers.
This object is attained by the method claimed in claim 1.
The invention provides a substant i81 reduction in the cost of the initial key establishement for symmetric key systems, especially when implemented using cryptographic products which are already available on the market, and using only publicly available services for the carriage of information such as the press or the regu]ar mail services, or such business meetings as would have been necessary for the establishment of prerequisite contracts.
An embodiment of the invention will now be described. The embodiment can (but need not) be implemented using IBM Transaction Security System products which are the TEM 4753 Network Security Processor which attaches to an central host computer running the IBM MVS Operating System, the IBM 4755 Cryptographic Adapter card, which resides inside a Personal Computer suppor-ting the AT-Bus or Microchannel architecture and running the DOS or 0 operating systems, the IBM 4754 Security Interface Unit which can attach to either of the foregoing to provide secure communications with the J3M Personal Security card which is a so-called "smart" card with secured data storage and cryptographic processing capability.The IBM Personal Security Card and the IBM 4753, 4754 and 4755 each have secure storage for encryption keys and cryptographic processing capability.
In the embodiment it is assumed that each site on which cryptography must run has established a fully operational cryptographic environment supporting a key management application and hardware facilities necessary to support the scheme. Such a system may have been set-up locally or via a central initialisation facility. Neither site need have any prior knowledge of the other site, but each supports the following: 1. Common Symmetric Key Algorithm Support - both sites support the same symmetric algorithm. The Data Encryption Algorithm or DEA is a standardised and widely used symmetric algorithm.
2. Key Part Loading - in most DEA systems, initial keys are loaded into the system by providing two or more clear parts. These are either concatenated or exclusive-ORed (XORed) together. It is assured that a common mechanism is supported at both sites.
3. Key Test Algorithm - both sites support a common method to test the true value of an installed key. The algorithm should not provide a channel of attack to discover the trne key value. The key test is available in two parts, the first to generate a pattern from an installed key, the second to verify a pattern against an installed key. The mechanism is available for testing koy parts as well as completed keys.
Such an algorithm is exemplified by thn TBM TSS Key Test verb.
4. A Secure Portable Data Processing revice - such would be typified by a smart card, but other possibilities exist. The description uses smart card" in this generic sense. Smart cards are nosed as the transport mechanism, and are interchangeable between the two sites. The IBM Personal Security card may be used and bas the following functions: a. Access Control - functions performed 011 the smart card may be selectively and independently controlled such that some are publicly available, and some require that the smart card authenticates the user. Publicly available means available both without user authentication, and without restriction as to which site the card is attached at the. time.
b. User Authentication - this is securely performed for users of the smart card by any means deemed adequate (eg PIN or Signature).
c. Site Restriction - user authentication is restricted on the smart card to being available only at the "home site" of the smart card.
This restriction is preferably be enforced by a random two way cryptographic challenge.
d. Data Access Control - a first data record on the smart card is capable of being defined such that it requires user authentication to allocate, read, delete or clear the data record; but writing to the data record is a publicly available function. A second data record on the smart card is capable of being defined such that it requires user authentication to allocate, write, delete or clear the data record; but reading the data from the record is a publicly available function.
e. Testable Key Register - a key register on the smart card contains a testable key that cannot be exported from the smart card. The Key Test function is publicly available. For the IBM Personal Security card the register is the smart card's Master Key register.
5. Site Access Control - each site is capable of access control to its cryptographic facilities independent]y of the use at the site of an 'alien' smart card (that is one whicit is unknown to the site). Such control could be by means of a previous]y entered "home" smart card.
There are several steps to the method, which are the same at both sites. The method is therefore described from the perspective of just one of the sites.
Each step of the mechanism is described in more detail below. In brief, however, each site creates a smart card with the properties described above with their two data records and a testable key in place.
Each site also creates a set of test patterns which may be published and against which the authenticity of the card itself can be verified by the other party. Each site then creates one part of the key to be agreed upon, and a test pattern for that key part. The test pattern is written to the site's own smart card in a data record that can be written only by this site but read publicly (so that it is accessible to the other site).
The cards are exchanged through the mail or via any other suitable means.
The received cards are tested for allt.llent:icity using the published test patterns. Once accepted as genuine, the test pattern for the key part of the other site is read and stored. The key par-t previously generated is written onto a data record of the received card; this data record allows public writing but restricts reading to the receiving site. The cards are exchanged again. The key part is read at the home site of the card, this is the only site at which it can he read, and ensures secrecy of the key part. The key part is verified for authenticity against the stored test pattern which was received earlier on an authenticated card; this process ensures the integrity of the key part (that it genuinely came from the author of the test pattern). Each site then combines the received key part with the locally created key part and they now share a common key.As the key parts were created without a prior knowledge of the value of the other part, the value of the resulting key is truly arbitrary. As the verification pattern for the key part was read from an authenticated card it can be established that the key part originated from the other site. A key has been agreed between sites with full integrity and secrecy, and at low cost.
In more detail, the steps of the method are: 1. Set Up - the smart card(s) to h used for key exchange are prepared.
For each smart card, a testable key is installed both on the card itself and at the owning site. A number of true key test patterns are created for the testable key. A number of false test patterns are also generated and tested to ensure that they are false. (The magnitude of "number" depends upon the degree of testing required and could be as small as two). The test patterns are published or otherwise sent to the other party.
2. Key Part Creation - a key part is created and installed on the home site. A test pattern for this part: is gsierated and written to a secured but publicly readable first data record on the smart card. Identifiers may also be written to the smart card. A secured but publicly writable second data record is also created on the card for use at the other site.
3. Card Exchange - the smart cards pre exchanged, for example through the regular mail. In this case a number of true and false test patterns would have been published. Otherwise the cards may be exchanged as a part of a contract negotiation or signing process, in which case a number of true and false test patterns could be exchanged at the sarge time.
Upon receipt, the card is tested by presenting true and false key test patterns. Upon request any number of further key patterns may be obtained from the correspondent by phone or ma:il, and tested for true or false. Similarly a number of true and false test patterns could be derived from card itself, and used to challenge the owner (again over the phone or by mail) who would use the site-installed copy of the card's key to determine which are true and which are false.
The number of such tests will be determined by the degree of certainty required that the card is genuine. The technique is well established related to 'Zero Knowledge Proof'. For 'n' satisfactory tests, the residual probability of a fake smart card is two to the power of minus 'n'.
4. Key Part Exchange - once the card has been accepted as genuine, the publicly readable second data record is read and the test pattern it: holds is securely stored at the receiving site. The key part that had been locally created is then written to t.he publicly writable first data record on the smart card. Identifiers may also be written tc the smart card. This data cannot be read except at: the smart card's own site. Its secrecy is therefore assured.
5. Card Return - the smart card(s) are then returned to their home sites, for example through the regular mail.
6. Card Reception - upon receipt the card is tested again for genuineness, by using true and false test patterns as described in step 3 above. This step distinguishes the card from any others that may be in current circulation from that site.
7. Key Part Reception - the smart cards autliorised user authenticates himself to the card. The first data record is now read. The key part on the received smart card is verified against the previously stored test pattern and if good is combined with that the previously generated key part that had been dispatched on a smart card to the other site. The result is the same key at both sites.
8. Testing The Key - a final stage of verification could be applied to the combined key. This could be performed in a variety of ways. A key test could be conducted over the phone (as above), or messages exchanged across a network and protected under the key.
An initial encryption key has now been exchanged between the parties. The same process could have been used to exchange several keys, or further keys could now be exchanged over a network under the protection of the initial key.
Secrecy is preserved as the key parts can be read only at the home site. Integrity is preserved through the authentication of the card and of the key part using the key test procedure. The cost of the key exchange is minimal in comparison to traditional courier based methods.
Further restrictions regarding timeliness of the procedure could be enforced if so desired.

Claims (2)

1. A method of establishing a common cryptogrphic key at two cryptographic sites each supporting to common mothoct of key testing using test patterns, comprising at each site: (a) preparing a portable data processing device having a first data record which can only be read at that site bllt which can be written to at any site, and a second data record which can only be written at that site but which can be read st any site, (b) creating a partial key and a test:: pattern therefor, and writing the test pattern but not the partial key into the second data record, (c) sending the device to the other site, (d) reading the test pattern from the second da-ta record of the other site's device and storing it at ::he site, (e) writing the partial key created at step (b) into the first data record of the other site's device, (f) returning the other site's device to the other site, (g) reading the partial key created at the othe-r site from the first data record of the returned device and verifying it using the test pattern obtained at step (d), and (h) combining the partial key created at step (b) with the partial key read at step (g) to form a full key which is the same as that formed at the other site.
2. A method as claimed in claim 1, wherein the portable data processing device also containing a testable key particular to that device, and wherein the method further comprises: between steps (a) and (b) the further step of creating a further test pattern Against which the authenticity of the device can be auj:hent:icated by the other site, and making such pattern available to the other site, between steps (c) and (f) the further step of authenticating the other site's device using the further test pattern, and between steps (f) and (li) the further step of authenticating the returned device using the further test pattern.
GB9218816A 1992-09-04 1992-09-04 Improvements in cryptography Expired - Fee Related GB2270446B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9218816A GB2270446B (en) 1992-09-04 1992-09-04 Improvements in cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9218816A GB2270446B (en) 1992-09-04 1992-09-04 Improvements in cryptography

Publications (3)

Publication Number Publication Date
GB9218816D0 GB9218816D0 (en) 1992-10-21
GB2270446A true GB2270446A (en) 1994-03-09
GB2270446B GB2270446B (en) 1996-01-24

Family

ID=10721449

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9218816A Expired - Fee Related GB2270446B (en) 1992-09-04 1992-09-04 Improvements in cryptography

Country Status (1)

Country Link
GB (1) GB2270446B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2319711A (en) * 1996-11-26 1998-05-27 Polymeters Response Internatio Verifyng that a stored cryptographic key has not been altered before allowing its use
GB2358333A (en) * 1999-10-01 2001-07-18 Geneticware Co Ltd Emulating a secret code between two hardware modules
DE10250810A1 (en) * 2002-09-11 2004-03-25 Giesecke & Devrient Gmbh Cryptographic computation method for running protected computation in smart cards produces a code with two or more code parameters
DE10258323A1 (en) * 2002-12-13 2004-06-24 Giesecke & Devrient Gmbh Increasing security against determination of encryption key, by evaluating input data based on check of predetermined criteria and calculating cipher text accordingly
GB2408181A (en) * 2003-11-13 2005-05-18 Toshiba Res Europ Ltd Configuring a wireless connection using a physical token containing two sets of configuration information
US7983414B2 (en) 2002-09-11 2011-07-19 Giesecke & Devrient Gmbh Protected cryptographic calculation

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6128391A (en) * 1997-09-22 2000-10-03 Visa International Service Association Method and apparatus for asymetric key management in a cryptographic system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0254812A2 (en) * 1986-06-27 1988-02-03 International Business Machines Corporation Cryptovariable initialisation in a public key network
EP0277247A1 (en) * 1986-07-31 1988-08-10 Kabushiki Kaisya Advance System for generating a shared cryptographic key and a communication system using the shared cryptographic key
EP0393806A2 (en) * 1989-04-17 1990-10-24 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0254812A2 (en) * 1986-06-27 1988-02-03 International Business Machines Corporation Cryptovariable initialisation in a public key network
EP0277247A1 (en) * 1986-07-31 1988-08-10 Kabushiki Kaisya Advance System for generating a shared cryptographic key and a communication system using the shared cryptographic key
EP0393806A2 (en) * 1989-04-17 1990-10-24 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2319711A (en) * 1996-11-26 1998-05-27 Polymeters Response Internatio Verifyng that a stored cryptographic key has not been altered before allowing its use
GB2319711B (en) * 1996-11-26 2001-08-08 Polymeters Response Internat L Improvement of security of cryptographic system
GB2358333A (en) * 1999-10-01 2001-07-18 Geneticware Co Ltd Emulating a secret code between two hardware modules
GB2358333B (en) * 1999-10-01 2003-06-25 Geneticware Co Ltd Method and system for emulating a secret code between two hardware modules
DE10250810A1 (en) * 2002-09-11 2004-03-25 Giesecke & Devrient Gmbh Cryptographic computation method for running protected computation in smart cards produces a code with two or more code parameters
US7983414B2 (en) 2002-09-11 2011-07-19 Giesecke & Devrient Gmbh Protected cryptographic calculation
DE10258323A1 (en) * 2002-12-13 2004-06-24 Giesecke & Devrient Gmbh Increasing security against determination of encryption key, by evaluating input data based on check of predetermined criteria and calculating cipher text accordingly
GB2408181A (en) * 2003-11-13 2005-05-18 Toshiba Res Europ Ltd Configuring a wireless connection using a physical token containing two sets of configuration information
GB2408181B (en) * 2003-11-13 2005-10-19 Toshiba Res Europ Ltd Wireless network

Also Published As

Publication number Publication date
GB2270446B (en) 1996-01-24
GB9218816D0 (en) 1992-10-21

Similar Documents

Publication Publication Date Title
JP3622433B2 (en) Access credential authentication apparatus and method
US7797541B2 (en) Method and apparatus for providing cellular telephone service using an authenticating cellular telephone device
US5602918A (en) Application level security system and method
US7362869B2 (en) Method of distributing a public key
US5548721A (en) Method of conducting secure operations on an uncontrolled network
US6615352B2 (en) Device and method for authenticating user's access rights to resources
AU674560B2 (en) A method for premitting digital secret information to be recovered.
US5475758A (en) User authenticating system and method in wide area distributed environment
US20020129261A1 (en) Apparatus and method for encrypting and decrypting data recorded on portable cryptographic tokens
US20020133704A1 (en) Verification of identity of participant in electronic communication
US20020062452A1 (en) Countering credentials copying
US20050044377A1 (en) Method of authenticating user access to network stations
JPH03185551A (en) Digital time validation apparatus
JP2000357156A (en) System and method for authentication sheet distribution
WO1997016902A2 (en) Unified end-to-end security methods and systems for operating on insecure networks
KR20000075650A (en) Administration and utilization of secret fresh random numbers in a networked environment
JPH113033A (en) Method for identifying client for client-server electronic transaction, smart card and server relating to the same, and method and system for deciding approval for co-operation by user and verifier
JPS61139878A (en) Safety protection module for electronic fund transfer
US20030228886A1 (en) Electronic value data communication method, communication system, IC card, portable terminal, and communication
US6831982B1 (en) Encryption key management system using multiple smart cards
CN103888410B (en) Application identity verification method and system
CN109981287A (en) A kind of code signature method and its storage medium
KR102396824B1 (en) Blockchain-based identity system
CN107358118A (en) SFS access control methods and system, SFS and terminal device
Tsuji et al. One-time password authentication protocol against theft attacks

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 19990904