GB2270446A - Establishing a common cryptographic key at two cryptographic sites - Google Patents
Establishing a common cryptographic key at two cryptographic sites Download PDFInfo
- Publication number
- GB2270446A GB2270446A GB9218816A GB9218816A GB2270446A GB 2270446 A GB2270446 A GB 2270446A GB 9218816 A GB9218816 A GB 9218816A GB 9218816 A GB9218816 A GB 9218816A GB 2270446 A GB2270446 A GB 2270446A
- Authority
- GB
- United Kingdom
- Prior art keywords
- site
- key
- data record
- card
- test pattern
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/26—Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The method includes preparing a portable data processing device ("smart card") at each site having a first data record which can only be read at that site but which can be written to at any site, and a second data record which can only be written at that site but which can be read at any site, the device also containing a testable key particular to that device. Each site also creates and publishes a set of test patterns against which the authenticity of the card can be verified. Each site then creates one part of the key to be agreed upon, and a test pattern for that key part. The test pattern is written to the site's own smart card in the second data record. The cards are exchanged, and the received cards are tested for authenticity using the published test patterns. Once accepted as genuine, the test pattern for the key part of the other site is read and stored. The key part previously generated is written onto the first data record of the received card. The cards are exchanged again. The key part is read at the home site of the card. The key part is verified for authenticity against the stored test pattern which was received earlier. Each site then combines the received key part with the locally created key part and they now share a common key.
Description
IMPROVEMENTS IN CRYPTOGRAPlI? this invention relates to a method of establishing a common cryptographic key at two cryptographic sites.
In general, cryptography has used i-hree main forms of algorithm:
Hashing Algorithms - these are one way functions which require no secret keys to be distributed.
Public Key Algorithms - these flre asymmetric key systems which have the advantage for the initial distrihtion of keys that the distributed key may be published. As there is no reqIlirement for secrecy, initial keys may be exchanged between previollFly l3nknosçn systems without the need for a channel of secrecy (for example trllsted couriers).
Symmetric Key Algorithms - these algorithm6 require that the same secret key is held by both the sender and receiver of messages. The exchange of of initial secret keys between previously unknown systems has in the state of the art always been relatively expensive, because it has required a channel of secrecy as well as of integrity to exchange these initial keys.
It has been proposed that by providing public key cryptcgraphy to manage the initial keys of symmetric key algorithms, the problem of key exchange may be addressed. However, this requires a system supporting both algorithms in a closely integrated and secure environment, comnlonly known as a hybrid scheme.
It is therefore an object of this invention to pro-vide a new approach to the distribution of initial symmetric keys that does not; require the use of hybrid cryptographic systems or trusted ccuriers.
This object is attained by the method claimed in claim 1.
The invention provides a substant i81 reduction in the cost of the initial key establishement for symmetric key systems, especially when implemented using cryptographic products which are already available on the market, and using only publicly available services for the carriage of information such as the press or the regu]ar mail services, or such business meetings as would have been necessary for the establishment of prerequisite contracts.
An embodiment of the invention will now be described. The embodiment can (but need not) be implemented using IBM Transaction
Security System products which are the TEM 4753 Network Security
Processor which attaches to an central host computer running the IBM MVS
Operating System, the IBM 4755 Cryptographic Adapter card, which resides inside a Personal Computer suppor-ting the AT-Bus or Microchannel architecture and running the DOS or 0 operating systems, the IBM 4754
Security Interface Unit which can attach to either of the foregoing to provide secure communications with the J3M Personal Security card which is a so-called "smart" card with secured data storage and cryptographic processing capability.The IBM Personal Security Card and the IBM 4753, 4754 and 4755 each have secure storage for encryption keys and cryptographic processing capability.
In the embodiment it is assumed that each site on which cryptography must run has established a fully operational cryptographic environment supporting a key management application and hardware facilities necessary to support the scheme. Such a system may have been set-up locally or via a central initialisation facility. Neither site need have any prior knowledge of the other site, but each supports the following: 1. Common Symmetric Key Algorithm Support - both sites support the same symmetric algorithm. The Data Encryption Algorithm or DEA is a standardised and widely used symmetric algorithm.
2. Key Part Loading - in most DEA systems, initial keys are loaded into the system by providing two or more clear parts. These are either concatenated or exclusive-ORed (XORed) together. It is assured that a common mechanism is supported at both sites.
3. Key Test Algorithm - both sites support a common method to test the true value of an installed key. The algorithm should not provide a channel of attack to discover the trne key value. The key test is available in two parts, the first to generate a pattern from an installed key, the second to verify a pattern against an installed key. The mechanism is available for testing koy parts as well as completed keys.
Such an algorithm is exemplified by thn TBM TSS Key Test verb.
4. A Secure Portable Data Processing revice - such would be typified by a smart card, but other possibilities exist. The description uses smart card" in this generic sense. Smart cards are nosed as the transport mechanism, and are interchangeable between the two sites. The IBM
Personal Security card may be used and bas the following functions: a. Access Control - functions performed 011 the smart card may be
selectively and independently controlled such that some are
publicly available, and some require that the smart card
authenticates the user. Publicly available means available both
without user authentication, and without restriction as to which
site the card is attached at the. time.
b. User Authentication - this is securely performed for users of the
smart card by any means deemed adequate (eg PIN or Signature).
c. Site Restriction - user authentication is restricted on the smart
card to being available only at the "home site" of the smart card.
This restriction is preferably be enforced by a random two way
cryptographic challenge.
d. Data Access Control - a first data record on the smart card is
capable of being defined such that it requires user authentication
to allocate, read, delete or clear the data record; but writing to
the data record is a publicly available function. A second data
record on the smart card is capable of being defined such that it
requires user authentication to allocate, write, delete or clear
the data record; but reading the data from the record is a
publicly available function.
e. Testable Key Register - a key register on the smart card contains
a testable key that cannot be exported from the smart card. The
Key Test function is publicly available. For the IBM Personal
Security card the register is the smart card's Master Key
register.
5. Site Access Control - each site is capable of access control to its cryptographic facilities independent]y of the use at the site of an 'alien' smart card (that is one whicit is unknown to the site). Such control could be by means of a previous]y entered "home" smart card.
There are several steps to the method, which are the same at both sites. The method is therefore described from the perspective of just one of the sites.
Each step of the mechanism is described in more detail below. In brief, however, each site creates a smart card with the properties described above with their two data records and a testable key in place.
Each site also creates a set of test patterns which may be published and against which the authenticity of the card itself can be verified by the other party. Each site then creates one part of the key to be agreed upon, and a test pattern for that key part. The test pattern is written to the site's own smart card in a data record that can be written only by this site but read publicly (so that it is accessible to the other site).
The cards are exchanged through the mail or via any other suitable means.
The received cards are tested for allt.llent:icity using the published test patterns. Once accepted as genuine, the test pattern for the key part of the other site is read and stored. The key par-t previously generated is written onto a data record of the received card; this data record allows public writing but restricts reading to the receiving site. The cards are exchanged again. The key part is read at the home site of the card, this is the only site at which it can he read, and ensures secrecy of the key part. The key part is verified for authenticity against the stored test pattern which was received earlier on an authenticated card; this process ensures the integrity of the key part (that it genuinely came from the author of the test pattern). Each site then combines the received key part with the locally created key part and they now share a common key.As the key parts were created without a prior knowledge of the value of the other part, the value of the resulting key is truly arbitrary. As the verification pattern for the key part was read from an authenticated card it can be established that the key part originated from the other site. A key has been agreed between sites with full integrity and secrecy, and at low cost.
In more detail, the steps of the method are: 1. Set Up - the smart card(s) to h used for key exchange are prepared.
For each smart card, a testable key is installed both on the card itself and at the owning site. A number of true key test patterns are created for the testable key. A number of false test patterns are also generated and tested to ensure that they are false. (The magnitude of "number" depends upon the degree of testing required and could be as small as two). The test patterns are published or otherwise sent to the other party.
2. Key Part Creation - a key part is created and installed on the home site. A test pattern for this part: is gsierated and written to a secured but publicly readable first data record on the smart card. Identifiers may also be written to the smart card. A secured but publicly writable second data record is also created on the card for use at the other site.
3. Card Exchange - the smart cards pre exchanged, for example through the regular mail. In this case a number of true and false test patterns would have been published. Otherwise the cards may be exchanged as a part of a contract negotiation or signing process, in which case a number of true and false test patterns could be exchanged at the sarge time.
Upon receipt, the card is tested by presenting true and false key test patterns. Upon request any number of further key patterns may be obtained from the correspondent by phone or ma:il, and tested for true or false. Similarly a number of true and false test patterns could be derived from card itself, and used to challenge the owner (again over the phone or by mail) who would use the site-installed copy of the card's key to determine which are true and which are false.
The number of such tests will be determined by the degree of certainty required that the card is genuine. The technique is well established related to 'Zero Knowledge Proof'. For 'n' satisfactory tests, the residual probability of a fake smart card is two to the power of minus 'n'.
4. Key Part Exchange - once the card has been accepted as genuine, the publicly readable second data record is read and the test pattern it: holds is securely stored at the receiving site. The key part that had been locally created is then written to t.he publicly writable first data record on the smart card. Identifiers may also be written tc the smart card. This data cannot be read except at: the smart card's own site. Its secrecy is therefore assured.
5. Card Return - the smart card(s) are then returned to their home sites, for example through the regular mail.
6. Card Reception - upon receipt the card is tested again for genuineness, by using true and false test patterns as described in step 3 above. This step distinguishes the card from any others that may be in current circulation from that site.
7. Key Part Reception - the smart cards autliorised user authenticates himself to the card. The first data record is now read. The key part on the received smart card is verified against the previously stored test pattern and if good is combined with that the previously generated key part that had been dispatched on a smart card to the other site. The result is the same key at both sites.
8. Testing The Key - a final stage of verification could be applied to the combined key. This could be performed in a variety of ways. A key test could be conducted over the phone (as above), or messages exchanged across a network and protected under the key.
An initial encryption key has now been exchanged between the parties. The same process could have been used to exchange several keys, or further keys could now be exchanged over a network under the protection of the initial key.
Secrecy is preserved as the key parts can be read only at the home site. Integrity is preserved through the authentication of the card and of the key part using the key test procedure. The cost of the key exchange is minimal in comparison to traditional courier based methods.
Further restrictions regarding timeliness of the procedure could be enforced if so desired.
Claims (2)
1. A method of establishing a common cryptogrphic key at two cryptographic sites each supporting to common mothoct of key testing using test patterns, comprising at each site: (a) preparing a portable data processing device having a first data
record which can only be read at that site bllt which can be
written to at any site, and a second data record which can only be
written at that site but which can be read st any site, (b) creating a partial key and a test:: pattern therefor, and writing
the test pattern but not the partial key into the second data
record, (c) sending the device to the other site, (d) reading the test pattern from the second da-ta record of the other
site's device and storing it at ::he site, (e) writing the partial key created at step (b) into the first data
record of the other site's device, (f) returning the other site's device to the other site, (g) reading the partial key created at the othe-r site from the first
data record of the returned device and verifying it using the test
pattern obtained at step (d), and (h) combining the partial key created at step (b) with the partial key
read at step (g) to form a full key which is the same as that formed
at the other site.
2. A method as claimed in claim 1, wherein the portable data processing device also containing a testable key particular to that device, and wherein the method further comprises: between steps (a) and (b) the further step of creating a further test pattern Against which the authenticity of the device can be auj:hent:icated by the other site, and making such pattern available to the other site, between steps (c) and (f) the further step of authenticating the other site's device using the further test pattern, and between steps (f) and (li) the further step of authenticating the returned device using the further test pattern.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9218816A GB2270446B (en) | 1992-09-04 | 1992-09-04 | Improvements in cryptography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9218816A GB2270446B (en) | 1992-09-04 | 1992-09-04 | Improvements in cryptography |
Publications (3)
Publication Number | Publication Date |
---|---|
GB9218816D0 GB9218816D0 (en) | 1992-10-21 |
GB2270446A true GB2270446A (en) | 1994-03-09 |
GB2270446B GB2270446B (en) | 1996-01-24 |
Family
ID=10721449
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9218816A Expired - Fee Related GB2270446B (en) | 1992-09-04 | 1992-09-04 | Improvements in cryptography |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2270446B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2319711A (en) * | 1996-11-26 | 1998-05-27 | Polymeters Response Internatio | Verifyng that a stored cryptographic key has not been altered before allowing its use |
GB2358333A (en) * | 1999-10-01 | 2001-07-18 | Geneticware Co Ltd | Emulating a secret code between two hardware modules |
DE10250810A1 (en) * | 2002-09-11 | 2004-03-25 | Giesecke & Devrient Gmbh | Cryptographic computation method for running protected computation in smart cards produces a code with two or more code parameters |
DE10258323A1 (en) * | 2002-12-13 | 2004-06-24 | Giesecke & Devrient Gmbh | Increasing security against determination of encryption key, by evaluating input data based on check of predetermined criteria and calculating cipher text accordingly |
GB2408181A (en) * | 2003-11-13 | 2005-05-18 | Toshiba Res Europ Ltd | Configuring a wireless connection using a physical token containing two sets of configuration information |
US7983414B2 (en) | 2002-09-11 | 2011-07-19 | Giesecke & Devrient Gmbh | Protected cryptographic calculation |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6128391A (en) * | 1997-09-22 | 2000-10-03 | Visa International Service Association | Method and apparatus for asymetric key management in a cryptographic system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0254812A2 (en) * | 1986-06-27 | 1988-02-03 | International Business Machines Corporation | Cryptovariable initialisation in a public key network |
EP0277247A1 (en) * | 1986-07-31 | 1988-08-10 | Kabushiki Kaisya Advance | System for generating a shared cryptographic key and a communication system using the shared cryptographic key |
EP0393806A2 (en) * | 1989-04-17 | 1990-10-24 | Trw Inc. | Cryptographic method and apparatus for public key exchange with authentication |
-
1992
- 1992-09-04 GB GB9218816A patent/GB2270446B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0254812A2 (en) * | 1986-06-27 | 1988-02-03 | International Business Machines Corporation | Cryptovariable initialisation in a public key network |
EP0277247A1 (en) * | 1986-07-31 | 1988-08-10 | Kabushiki Kaisya Advance | System for generating a shared cryptographic key and a communication system using the shared cryptographic key |
EP0393806A2 (en) * | 1989-04-17 | 1990-10-24 | Trw Inc. | Cryptographic method and apparatus for public key exchange with authentication |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2319711A (en) * | 1996-11-26 | 1998-05-27 | Polymeters Response Internatio | Verifyng that a stored cryptographic key has not been altered before allowing its use |
GB2319711B (en) * | 1996-11-26 | 2001-08-08 | Polymeters Response Internat L | Improvement of security of cryptographic system |
GB2358333A (en) * | 1999-10-01 | 2001-07-18 | Geneticware Co Ltd | Emulating a secret code between two hardware modules |
GB2358333B (en) * | 1999-10-01 | 2003-06-25 | Geneticware Co Ltd | Method and system for emulating a secret code between two hardware modules |
DE10250810A1 (en) * | 2002-09-11 | 2004-03-25 | Giesecke & Devrient Gmbh | Cryptographic computation method for running protected computation in smart cards produces a code with two or more code parameters |
US7983414B2 (en) | 2002-09-11 | 2011-07-19 | Giesecke & Devrient Gmbh | Protected cryptographic calculation |
DE10258323A1 (en) * | 2002-12-13 | 2004-06-24 | Giesecke & Devrient Gmbh | Increasing security against determination of encryption key, by evaluating input data based on check of predetermined criteria and calculating cipher text accordingly |
GB2408181A (en) * | 2003-11-13 | 2005-05-18 | Toshiba Res Europ Ltd | Configuring a wireless connection using a physical token containing two sets of configuration information |
GB2408181B (en) * | 2003-11-13 | 2005-10-19 | Toshiba Res Europ Ltd | Wireless network |
Also Published As
Publication number | Publication date |
---|---|
GB2270446B (en) | 1996-01-24 |
GB9218816D0 (en) | 1992-10-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3622433B2 (en) | Access credential authentication apparatus and method | |
US7797541B2 (en) | Method and apparatus for providing cellular telephone service using an authenticating cellular telephone device | |
US5602918A (en) | Application level security system and method | |
US7362869B2 (en) | Method of distributing a public key | |
US5548721A (en) | Method of conducting secure operations on an uncontrolled network | |
US6615352B2 (en) | Device and method for authenticating user's access rights to resources | |
AU674560B2 (en) | A method for premitting digital secret information to be recovered. | |
US5475758A (en) | User authenticating system and method in wide area distributed environment | |
US20020129261A1 (en) | Apparatus and method for encrypting and decrypting data recorded on portable cryptographic tokens | |
US20020133704A1 (en) | Verification of identity of participant in electronic communication | |
US20020062452A1 (en) | Countering credentials copying | |
US20050044377A1 (en) | Method of authenticating user access to network stations | |
JPH03185551A (en) | Digital time validation apparatus | |
JP2000357156A (en) | System and method for authentication sheet distribution | |
WO1997016902A2 (en) | Unified end-to-end security methods and systems for operating on insecure networks | |
KR20000075650A (en) | Administration and utilization of secret fresh random numbers in a networked environment | |
JPH113033A (en) | Method for identifying client for client-server electronic transaction, smart card and server relating to the same, and method and system for deciding approval for co-operation by user and verifier | |
JPS61139878A (en) | Safety protection module for electronic fund transfer | |
US20030228886A1 (en) | Electronic value data communication method, communication system, IC card, portable terminal, and communication | |
US6831982B1 (en) | Encryption key management system using multiple smart cards | |
CN103888410B (en) | Application identity verification method and system | |
CN109981287A (en) | A kind of code signature method and its storage medium | |
KR102396824B1 (en) | Blockchain-based identity system | |
CN107358118A (en) | SFS access control methods and system, SFS and terminal device | |
Tsuji et al. | One-time password authentication protocol against theft attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 19990904 |