首页> 外国专利> Cryptographic key replacement using key lifetimes

Cryptographic key replacement using key lifetimes

机译:使用密钥生存期的加密密钥替换

摘要

Business data flows from one computer system (1) to another (2) and its integrity can be protected by cryptographic means, such as digital signatures. In particular, a source system (1) may use a private key (DSPR) to sign outgoing data, and a destination system (2) may use a public key (DSPU) to verify incoming data. For security purposes all keys should be changed at scheduled times calculated using factors including key lifetime (from which is calculated the key expiry time) and key delivery time. If a key is compromised it needs to be changed at other than the scheduled time, and in general this will result in calculation of a new scheduled key change time. If a DSPR key is delivered to the source system (1) encrypted by a key encryption key (KEK), then change to the KEK key will in general also be needed upon compromise of the DSPR key. A new key changetime calculation can be avoided if another public key/private key pair is pre-generated and the public key part pre-supplied to the destination system (2), where it is stored as a spare. When the existing private key (DSPR) is compromised, the new private key corresponding to the spare is supplied to the source system (1) and can be put into use immediately. In this case the expiry time of the spare public key will be substantially the same as that of the original public key, as it will deemed to have been in use as of delivery, and recalculation of the key changetime will not be required. Preferably a public key in use at the destination system (2) is not revoked immediately upon compromise of the corresponding private key, in order to enable messages signed by that private key to be verified at the destination system, using the corresponding public key, during a predetermined time interval (message latency) after signing. A maximum value for the message latency may be set and used as another factor in the scheduled key change time calculation.
机译:业务数据从一个计算机系统(1)流向另一个(2),其完整性可以通过加密手段(例如数字签名)来保护。特别地,源系统(1)可以使用私钥(DSPR)来签名传出数据,而目的地系统(2)可以使用公钥(DSPU)来验证传入数据。为了安全起见,应在计划的时间使用包括密钥寿命(从中计算出密钥到期时间)和密钥交付时间在内的因素计算出的所有密钥进行更改。如果密钥被盗用,则需要在计划的时间之外进行更改,通常这将导致计算新的计划的密钥更改时间。如果通过密钥加密密钥(KEK)将DSPR密钥传送到源系统(1),则在损害DSPR密钥的情况下,通常还需要更改为KEK密钥。如果预先生成了另一个公钥/私钥对,并且该公钥部分已预先提供给目标系统(2),并将其作为备用存储,则可以避免新的密钥更改时间计算。当现有私钥(DSPR)遭到破坏时,对应于备用组件的新私钥将提供给源系统(1),并且可以立即投入使用。在这种情况下,备用公钥的到期时间将与原始公钥的到期时间基本相同,因为从交付之日起它就一直在使用中,因此不需要重新计算密钥更改时间。优选地,在目标系统(2)上使用的公共密钥在妥协相应的私有密钥后不会立即被撤销,以便使得在该目标系统(2)期间能够使用相应的公共密钥在目标系统上验证由该私有密钥签名的消息。签名后的预定时间间隔(消息等待时间)。可以设置消息等待时间的最大值,并将其用作计划的密钥更改时间计算中的另一个因素。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号