A PUBLIC-KEY EXTENSION TO THE COMMON CRYPTOGRAPHIC ARCHITECTURE

被引:1
|
作者
LE, AV
MATYAS, SM
JOHNSON, DB
WILKINS, JD
机构
[1] IBM Federal Systems Co, Manassas, VA
关键词
D O I
10.1147/sj.323.0461
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new method for extending the IBM Common Cryptographic Architecture (CCA) to include public key cryptography is presented. The public key extension provides nonrepudiation via digital signatures and an electronic means to distribute Data Encryption Algorithm (DEA) key-encrypting keys in a hybrid Data Encryption Algorithm-Public Key Algorithm (DEA-PKA) cryptographic system. The improvements are based on a novel method for extending the control vector concept used in the IBM Common Cryptographic Architecture. Four new key types that separate the public and private key pairs into four classes according to their broad uses within the cryptographic system are defined. The public key extension to the CCA is implemented in the IBM Transaction Security System (TSS). This paper discusses both the public key extension to the CCA and the TSS implementation of this architectural extension.
引用
收藏
页码:461 / 485
页数:25
相关论文
共 50 条
  • [31] Optimal extension fields for fast arithmetic in public-key algorithms
    Bailey, DV
    Paar, C
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 472 - 485
  • [32] Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions
    Roettger, Eric
    Williams, Hugh C.
    [J]. FUNDAMENTA INFORMATICAE, 2012, 114 (3-4) : 325 - 344
  • [33] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Chengyu Hu
    Rupeng Yang
    Pengtao Liu
    Tong Li
    Fanyu Kong
    [J]. The Journal of Supercomputing, 2019, 75 : 3099 - 3122
  • [34] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Li, Tong
    Kong, Fanyu
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
  • [35] An energy efficient reconfigurable public-key cryptography processor architecture
    Goodman, J
    Chandrakasan, A
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS-CHES 2000, PROCEEDINGS, 2001, 1965 : 175 - 190
  • [36] FPGA-based design of a large moduli multiplier for public-key cryptographic systems
    [J]. PROCEEDINGS 2006 INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, 2007, : 314 - 319
  • [37] Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions
    Ge Wu
    Jian-Chang Lai
    Fu-Chun Guo
    Willy Susilo
    Fu-Tai Zhang
    [J]. Journal of Computer Science and Technology, 2019, 34 : 1366 - 1379
  • [38] Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example
    Huang, Ke
    Mu, Yi
    Rezaeibagha, Fatemeh
    Zhang, Xiaosong
    Chen, Ting
    [J]. IEEE NETWORK, 2021, 35 (06): : 240 - 246
  • [39] Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions
    Wu, Ge
    Lai, Jian-Chang
    Guo, Fu-Chun
    Susilo, Willy
    Zhang, Fu-Tai
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (06) : 1366 - 1379
  • [40] Public-Key Cryptanalysis
    Nguyen, Phong Q.
    [J]. RECENT TRENDS IN CRYPTOGRAPHY, 2009, 477 : 67 - 119