TWI430643B - Secure key recovery system and method - Google Patents
Secure key recovery system and method Download PDFInfo
- Publication number
- TWI430643B TWI430643B TW99133952A TW99133952A TWI430643B TW I430643 B TWI430643 B TW I430643B TW 99133952 A TW99133952 A TW 99133952A TW 99133952 A TW99133952 A TW 99133952A TW I430643 B TWI430643 B TW I430643B
- Authority
- TW
- Taiwan
- Prior art keywords
- key
- card
- reply
- hsm
- center
- Prior art date
Links
- 238000011084 recovery Methods 0.000 title claims description 37
- 238000000034 method Methods 0.000 title claims description 33
- 238000003860 storage Methods 0.000 claims description 14
- 238000004891 communication Methods 0.000 claims description 13
- 230000008569 process Effects 0.000 claims description 13
- 238000007726 management method Methods 0.000 claims description 11
- 238000005516 engineering process Methods 0.000 claims description 9
- 238000004519 manufacturing process Methods 0.000 claims description 8
- 238000012550 audit Methods 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000012546 transfer Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 4
- 238000009826 distribution Methods 0.000 description 3
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 3
- 239000010931 gold Substances 0.000 description 3
- 229910052737 gold Inorganic materials 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 2
- 230000001427 coherent effect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000005406 washing Methods 0.000 description 1
Landscapes
- Retry When Errors Occur (AREA)
- Storage Device Security (AREA)
Description
金鑰備份與回復,以避免加密資料的金鑰若遺失、損壞或遭竊時,無法將原本以加密的密文解密還原。並透過使用IC卡及硬體 安全模組(HSM)等高安全性加密載存裝置輔助的配合,讓金鑰回復系統在金鑰儲存、傳輸過程中更安全,不易被駭客破解。The key is backed up and replied to avoid decrypting and restoring the encrypted ciphertext if the key of the encrypted data is lost, damaged or stolen. And through the use of IC cards and hardware The security module (HSM) and other high-security encryption storage devices assist the key recovery system in the process of key storage and transmission, and it is not easy to be cracked by hackers.
過去的金鑰回復技術包括卡務管理中心、金鑰保管中心及金鑰回復中心,金鑰回復機制僅負責加解密用金鑰對之私密金鑰的金鑰回復需求,每張IC卡中含有的兩組金鑰對:簽章用的金鑰對、加解密用金鑰對。The past key reply technology includes the card management center, the key custodian center and the key reply center. The key reply mechanism is only responsible for the key recovery request of the private key of the encryption and decryption key, and each IC card contains Two sets of key pairs: the key pair used for signing, and the key pair for encryption and decryption.
過去的卡務管理中心包含一個硬體安全模組(HSM),一個負責操作管理硬體安全模組及IC卡產製作業的主控台PC,在卡務管理中心的硬體安全模組,將負責終端使用者(以下稱:EE)加解密金鑰對產製以及加解密私鑰的分持加密作業,卡務管理中心將加解密私鑰分持加密送到位在不同的網段之金鑰保管中心,且必須經由加密的安全通道(例如:SSL)傳送資料到金鑰保管中心的各個金鑰儲存系統。硬體安全模組(HSM)連接金鑰載具時,潛在的問題有:一、金鑰載具中的重要訊息如何傳給硬體安全模組。二、如何讓硬體安全模組(HSM)能依金鑰載具中重要訊息更換以作簽章。三、金鑰載具能否在其內部將加密過的EE加解密私鑰作解密。四、金鑰載具能否在其內部,自行將解密後的EE加解密私鑰存入其內部。五、卡務管理中心與金鑰回復的權責劃分不明,運作程序較為複雜。In the past, the card management center included a hardware security module (HSM), a console PC that manages the hardware security module and IC card production operations, and a hardware security module in the card management center. Will be responsible for the end user (hereinafter referred to as: EE) encryption and decryption key to the production system and the encryption and decryption of the private key of the encryption operation, the card management center will encrypt and decrypt the private key share encryption to send the gold in different network segments The key custodian is located and must transfer data to each key storage system of the key custodian via an encrypted secure channel (eg SSL). When the hardware security module (HSM) is connected to the key carrier, the potential problems are as follows: 1. How important information in the key carrier is transmitted to the hardware security module. Second, how to make the hardware security module (HSM) replace the important information in the key carrier for signature. 3. Whether the key carrier can decrypt the encrypted EE encryption and decryption private key within it. 4. Whether the key carrier can internally store the decrypted EE encryption and decryption private key in its own. 5. The division of powers and responsibilities of the card management center and the key recovery is unclear, and the operational procedures are more complicated.
過去的金鑰保管中心包含複數個金鑰儲存系統,每個金鑰儲存系統負責將每個EE解密私鑰分割並加密後的分持金鑰儲存保管。每個金鑰儲存系統包含一個金鑰回復中心(以下稱:KRC)。金鑰儲存系統只儲存加密後的分持金鑰,不儲存未加密的資料。金 鑰儲存系統不具備將所儲存的加密分持金鑰解密並組合的功能。金鑰儲存系統只能接受並儲存從卡務管理中心傳來的加密後的分持金鑰。金鑰儲存系統只能把加密分持金鑰傳送給金鑰回復中心。金鑰保管中心的複數個金鑰儲存系統可能分別設置在不同的地理位置。The past key storage center includes a plurality of key storage systems, and each key storage system is responsible for storing and storing each of the EE decryption private keys and encrypting the shared key. Each key storage system contains a key reply center (hereinafter referred to as: KRC). The key storage system only stores the encrypted distribution key and does not store unencrypted data. gold The key storage system does not have the function of decrypting and combining the stored encrypted share keys. The key storage system can only accept and store the encrypted distribution key from the card management center. The key storage system can only transfer the encrypted distribution key to the key recovery center. The multiple key storage systems of the Key Custody Center may be set in different geographical locations.
過去的金鑰回復中心包含一個硬體安全模組(HSM),一個負責操作管理硬體安全模組(HSM)及金鑰回復作業的主控台PC。在金鑰回復中心的硬體安全模組(HSM),負責把分持加密的資料解密並組合成EE加解密私鑰以寫回IC卡的金鑰回復作業。依據IC卡資訊(如:IC卡卡號)從金鑰保管中心的複數個金鑰儲存系統,分別取得對應該IC卡的複數個加密分割的EE解密私鑰資料,金鑰回復中心內的的硬體安全模組(HSM)用其KRC私鑰把複數個加密分割的EE解密私鑰資料的每個部分作解密,硬體安全模組(HSM)把EE解密私鑰的複數個分割部分組合成原本的EE解密私鑰,硬體安全模組(HSM)直接把金鑰回復機制作出的EE解密私鑰寫入金鑰回復專用IC卡。如果金鑰回復中心和金鑰保管中心位在不同的網段,則必須經由加密的安全通道(例如:SSL),從金鑰保管中心中複數個金鑰儲存系統傳送資料到金鑰回復中心。潛在的問題有:一、若KRC的硬體安全模組(HSM)是分成兩部以上運作,每部各自處理來自金鑰保管中心的加密分持私鑰,則當兩部以上硬體安全模組(HSM)個別解密後,要如何安全地彙集各自解密後的分持私鑰並組合成一個EE私密金鑰。二、可能遭受中間人攻擊。過去的金鑰回復技術尚無法有效解決此問題。The past key recovery center included a hardware security module (HSM), a console PC that handles the management of hardware security modules (HSMs) and key recovery operations. The hardware security module (HSM) in the key recovery center is responsible for decrypting and combining the encrypted data into EE encryption and decryption private keys to write back the key recovery operation of the IC card. According to the IC card information (such as the IC card number), the EE decryption private key data corresponding to the plurality of encrypted segments of the IC card is obtained from the plurality of key storage systems of the key storage center, and the key is restored in the center. The Body Security Module (HSM) decrypts each part of the EE decrypted private key data with a plurality of encrypted partitions using its KRC private key, and the hardware security module (HSM) combines the plurality of split parts of the EE decrypted private key into The original EE decryption private key, the hardware security module (HSM) directly writes the EE decryption private key made by the key reply mechanism to the key recovery dedicated IC card. If the key reply center and the key custodian are located on different network segments, the data must be transmitted from the key storage system in the key custodian to the key replies via an encrypted secure channel (for example, SSL). The potential problems are as follows: 1. If the KRC hardware security module (HSM) is divided into two or more operations, each of which handles the encrypted private key from the key storage center, then two or more hardware security modules. After the individual (HSM) decryption, how to securely collect the decrypted private keys and combine them into an EE private key. Second, may suffer from man-in-the-middle attacks. Past key recovery techniques have not been able to effectively solve this problem.
由於傳統金鑰回復機制仍存在許多安全漏洞及駭客攻防的討論議題,因此本安全的金鑰回復方法特別針對這些問題做修正,並 研討出更為安穩、堅固及安全的新世代金鑰回復概念。Since the traditional key reply mechanism still has many security vulnerabilities and discussion topics of hacker attack and defense, this security key recovery method specifically corrects these problems, and Explore the concept of a new generation of key recovery that is more secure, robust and secure.
由此可見,上述習用方式仍有缺失,實非一良善之設計,而亟待加以改良。It can be seen that the above-mentioned conventional methods are still missing, which is not a good design, and needs to be improved.
本發明鑑於上述習用方式所衍生的各項缺點,乃亟思加以改良創新,並經苦心孤詣潛心研究後,終於成功研發完成本一種安全的金鑰回復方法。In view of the shortcomings derived from the above-mentioned conventional methods, the present invention has been improved and innovated, and after painstaking research, finally successfully developed a safe key recovery method.
本發明之目的乃在提供一種安全的金鑰回復系統與方法,以提升金鑰回復的安全性,避免金鑰在回復的過程中被中介程式惡意之攻擊,取得備份/回復之金鑰明文。The purpose of the present invention is to provide a secure key recovery system and method for improving the security of key recovery, avoiding malicious attacks by the intermediary program in the process of replying, and obtaining the clear/response key plaintext.
達成上述發明目的之一種安全的金鑰回復系統與方法,使得任一中介程式在金鑰回復過程中無法取得備份/回復之金鑰明文,本發明利用IC晶片卡及HSM來輔助安全金鑰回復系統與方法之建立,為了達成本發明目的之安全的金鑰回復方法,其中該發明內容包括:一、金鑰備份技術;二、金鑰回復技術;三、金鑰備份與回復之安全通訊協定。A secure key recovery system and method for achieving the above object, so that any intermediary program cannot obtain the backup/restore key plaintext during the key reply process, and the present invention utilizes the IC chip card and the HSM to assist the security key reply. System and method for establishing a secure key recovery method for achieving the purpose of the present invention, wherein the invention includes: 1. a key backup technology; 2. a key reply technology; and a secure communication protocol for key backup and reply. .
(1)金鑰備份技術,主要的運作角色包含金鑰回復中心(KRC)及卡務管理中心(CMC),金鑰回復中心與卡務管理中心共用其資料庫,各自使用各自的資料表互不交錯干擾;(2)金鑰回復技術,包含憑證管理中心儲存庫(Repository)、卡務管理中心及金鑰回復中心的詳細運作程序;(3)金鑰備份與回復之安全通訊協定,包含安全協定的演算流程。(1) Key backup technology, the main operational roles include Key Responsive Center (KRC) and Card Management Center (CMC). The Key Retrieval Center and the Card Management Center share their databases, each using their own data sheets. (2) Key recovery technology, including the detailed operation procedures of the Credential Management Center Repository, the Card Management Center and the Key Retrieval Center; (3) The secure communication protocol for key backup and reply, including The calculation process of the safety agreement.
請參閱圖一所示,為安全的金鑰回復系統整體關係圖,其實施之角色包括:Please refer to Figure 1 for the security key recovery system overall relationship diagram, its implementation role includes:
(1)憑證管理中心儲存庫(Repository)11,憑證管理中心儲存庫主要提供金鑰回復中心下載憑證、狀態查詢、金鑰回復申請單下載及相關公告之服務。(1) The voucher management center repository (Repository) 11 , the voucher management center repository mainly provides the key reply center download voucher, status query, key reply request form download and related announcement service.
(2)稽核主機(Audit)12,稽核主機主要記錄金鑰備份與金鑰回復時運作之重要資料,並提供相關之安全稽核查詢。(2) Auditing host (Audit) 12, the auditing host mainly records the important information of the operation of the key backup and key reply, and provides relevant security audit inquiry.
(3)卡務管理中心(CMC)13:(3) Card Management Center (CMC) 13:
a. 卡務管理中心將金鑰回復中心所產製之HSM與IC卡間互認之回復金鑰Kr(此金鑰專門使用於金鑰回復協定,以下以Kr專指此協定金鑰)經另一把加解密金鑰KKr(專門用於加解密Kr,以下簡稱KKr)加密的資料,存放入卡管資料庫中,並將加解密金鑰KKr寫入IC卡內,至於回復金鑰Kr在金鑰回復中心則是利用A/B金鑰分持碼單,將回復金鑰Kr寫入HSM,避免金鑰的暴露。a. The card management center will reply the key to the mutual authentication between the HSM and the IC card produced by the key recovery center (this key is used exclusively for the key reply agreement, the following is specifically referred to as the agreement key by Kr) Another data encrypted by the encryption and decryption key KKr (specifically used for encryption and decryption Kr, hereinafter referred to as KKr) is stored in the card management database, and the encryption and decryption key KKr is written into the IC card. As for the reply key Kr In the key reply center, the A/B key is used to share the code list, and the reply key Kr is written into the HSM to avoid the exposure of the key.
b. 提供已初始化之空白IC卡給金鑰回復中心進行金鑰備份與回復之用,該IC卡已寫入金鑰備份/回復所需之IC卡專用程式(以下簡稱Applet)與被加解密金鑰KKr所加密的Kr資料。b. Provide the initialized blank IC card to the key recovery center for key backup and reply. The IC card has been written into the key card special program (hereinafter referred to as Applet) and encrypted and decrypted. The Kr data encrypted by the key KKr.
(4)金鑰回復中心(KRC)14,金鑰回復中心為主要進行金鑰備份與回復之主要核心,於發卡時進行金鑰之備份;於金鑰回復時,進行申請作業之審核,接著進行金鑰回復寫卡與印製。(4) Key Responsive Center (KRC) 14. The key reply center is the main core for key backup and reply, and the key is backed up when the card is issued. When the key is replied, the application operation is reviewed, and then The key is replied to the card and printed.
(5)金鑰回復資料庫15,金鑰回復資料庫主要儲存備份之金鑰 與進行金鑰回復之相關資料。(5) Key reply database 15, the key reply database mainly stores the backup key Information related to the key reply.
請參閱圖二所示,為金鑰備份角色關係與流程圖,其實施之角色包括:金鑰回復中心(金鑰產製與回復寫卡)21、資料管理中心(共用DBMS)22、卡務管理中心(個人化的預處理)23。Please refer to Figure 2, for the key backup role relationship and flow chart, the implementation role includes: key recovery center (key production and reply write card) 21, data management center (shared DBMS) 22, card service Management Center (personalized pre-processing) 23.
主要的運作角色有二個:金鑰回復中心及卡務管理中心,金鑰回復中心與卡務管理中心共用其資料庫,各自使用各自的資料表互不交錯干擾。金鑰備份發卡之進行必須完成以下之前置作業:There are two main operational roles: the Key Responsive Center and the Card Management Center. The Key Responsive Center and the Card Management Center share their databases, each using their own data sheets without interlacing. The key backup must be completed before the key backup card is issued:
(1)金鑰回復中心之HSM與待發卡的IC卡中都有一把相同的資料加密對稱金鑰(Kr),以用於金鑰備份或回復時HSM與IC卡互認之信賴基礎:(1) The HSM of the key reply center and the IC card of the pending card all have the same data encryption symmetric key (Kr), which is used for the trust basis of HSM and IC card mutual recognition when the key is backed up or restored:
a. 總共有n把,HSM內含n把Kr,分別為Kr1,Kr2,...,Krn,而IC卡內只有一把加解密Kr的金鑰(KKr)。There are a total of n, HSM contains n Kr, respectively Kr1, Kr2, ..., Krn, and there is only one key in the IC card to decrypt and decrypt Kr (KKr).
b. 每批IC卡以卡號對應卡管資料庫中的某把Krj,取出卡管資料庫中對應的用KKr加密後的Krj,利用卡片中之KKr解密,得出Krj,會與HSM內之Kr1至Krn內某一把相同。b. Each batch of IC card corresponds to a Krj in the card management database with the card number, and the corresponding Krj encrypted by KKr in the card management database is retrieved, and the Krj is decrypted by the KKr in the card to obtain Krj, which will be in the HSM. One of Kr1 to Krn is the same.
c. n把Kr由金鑰回復中心產生,並用A/B金鑰分持碼單將Kr寫入HSM,並將n把Kr用KKr加密後資料送至卡務管理中心存入卡管資料庫。c. nKr is generated by the key recovery center, and Kr is written into the HSM by the A/B key, and the data is sent to the card management center by the Kr. .
(2)在開始洗卡時卡務管理中心就將含有KKr的Key Recovery Applet寫到IC卡中,而金鑰回復中心也會事先以A/B金鑰分持碼單將n把Kr寫入金鑰回復中心HSM內,每把Key對應到乙批IC卡,每批IC卡以卡號對應其內之Kr。(2) At the beginning of the card washing, the card management center will write the Key Recovery Applet containing KKr to the IC card, and the key recovery center will also write the Kr in advance with the A/B key. In the key recovery center HSM, each key corresponds to the B batch of IC cards, and each batch of IC cards corresponds to the Kr within the card number.
(3)金鑰回復中心之HSM硬體安全模組事先產生加解密的金 鑰以HSM硬體安全模組內部自行產生的金鑰Kh(此保密金鑰專門用於保密重要資料,且僅存在於HSM內,以Kh表示)進行加密,並將加過密的金鑰滙出至金鑰回復中心之硬碟以便事後大量寫入IC卡內。(3) The HSM hardware security module of the key recovery center generates the encryption and decryption gold in advance. The key is encrypted by the internal key Kh generated by the HSM hardware security module (this secret key is used exclusively for confidential important information and exists only in the HSM, denoted by Kh), and the key is added. The hard disk to the key recovery center is frequently written into the IC card afterwards.
待前置作業完成後進行發卡階段之金鑰備份,流程概述如下:After the pre-operation is completed, the key backup in the card issuance phase is completed. The process is summarized as follows:
(1)金鑰回復中心首先將已授權的操作卡插入HSM內。(1) The Key Retrieval Center first inserts the authorized operation card into the HSM.
(2)再插入含有可計算出待寫卡之SO(Super Officer)PIN碼的SAM卡。(2) Reinsert the SAM card containing the SO (Super Officer) PIN code that can calculate the card to be written.
(3)驗證PIN碼後,將先前準備好的IC卡(已將KKr與Key Recovery Applet寫入的IC卡)置入讀卡機內。(3) After verifying the PIN code, the previously prepared IC card (the IC card that has been written by KKr and Key Recovery Applet) is placed in the card reader.
(4)執行HSM與IC卡(Key Recovery Applet)間發卡階段之金鑰備份協定,將先前預先產生的加解密金鑰寫入IC卡內正確的Key container中。(4) Perform a key backup agreement between the HSM and the Key Recovery Applet in the card issuance phase, and write the previously generated encryption and decryption key into the correct Key container in the IC card.
(5)之後將使用HSM之Kh加密過的加解密金鑰,再使用加密程式寫至共用資料庫內,作為後續金鑰回復之用。(5) Afterwards, the encryption and decryption key encrypted by Kh of HSM will be used, and then the encryption program is used to write to the shared database for use as a subsequent key reply.
請參閱圖三所示,為金鑰備份與回復之安全通訊協定圖,為橋接HSM硬體安全模組與IC卡使其二個「被動式」元件間能安全地完成寫入金鑰的動作,必須設計一個可抵禦第三者之協定。整個金鑰備份與回復之安全通訊協定之技術描述如下:Referring to FIG. 3, the secure communication protocol diagram for the key backup and reply is to bridge the HSM hardware security module and the IC card to securely write the key between the two "passive" components. An agreement to defend against third parties must be designed. The technical description of the secure communication protocol for the entire key backup and reply is as follows:
(1)協定運作解說:(1) Explanation of the operation of the agreement:
a. 起始狀態:HSM和IC卡共享一把只有對方才知道的回復金鑰Kr,該把Kr將作為雙方交握之認證基礎以及秘密傳遞資料之加解密金鑰,長度為192bits(可依需求定義),且各自保存在HSM硬體安全模組與IC卡內部,不可被竊取或竄改。本協定使用的加解密演算法為AES 對稱式加解密演算法(亦可採用其它對稱式加解密演算法)。圖中E(.)及D(.)代表加密與解密,而在E(.)和D(.)之下標代表使用的Key,””代表將資料疊接起來。此外,本協定雙方間的任何訊息傳遞,皆是先傳送給中介程式,再透過中介程式轉傳給對方的意思。a. Starting state: HSM and IC card share a reply key Kr that only the other party knows. This Kr will be used as the authentication basis for both parties and the encryption and decryption key for secretly transmitting data. The length is 192bits. Requirements definition), and each is stored inside the HSM hardware security module and IC card, and cannot be stolen or tampered with. The encryption and decryption algorithm used in this protocol is the AES symmetric encryption and decryption algorithm (other symmetric encryption and decryption algorithms can also be used). In the figure, E(.) and D(.) represent encryption and decryption, and under E(.) and D(.), the key is used." "The representative embosses the information. In addition, any message between the parties to this Agreement is transmitted to the intermediary program and then passed to the other party through the intermediary program.
b. 第一回合:IC卡先用安全的亂數產生器產生一個當次使用的會議金鑰SK,長度為192bits,接下來用本身與對方才知道的回復金鑰Kr以AES演算法加密會議金鑰SK,並將之傳送給HSM硬體安全模組。b. The first round: The IC card first uses a secure random number generator to generate a conference key SK for the current use, which is 192 bits long. Then, the AES algorithm is used to encrypt the conference with the reply key Kr that is known to the other party. The key SK is transmitted to the HSM hardware security module.
c. 第二回合:HSM硬體安全模組以回復金鑰Kr以AES演算法進行解密,解出會議金鑰SK,接下來產生一個臨時使用的亂數值(即Nonce)N1,並以前面剛解出的會議金鑰SK做為加密的金鑰,加密N1後「傳送」給IC卡。c. The second round: the HSM hardware security module decrypts the key Kr with the AES algorithm, solves the conference key SK, and then generates a temporary used random number (Nonce) N1, and The solved conference key SK is used as an encrypted key, and is encrypted and transmitted to the IC card.
d. 第三回合:IC卡以先前產生的SK解密HSM傳來的ESK(N1),解出N1值後產生另一個臨時使用的亂數值N2,並將N2疊接於N1後整個以SK加密後回送給HSM硬體安全模組。d. The third round: the IC card uses the ESK (N1) transmitted from the previously generated SK decryption HSM, and solves the N1 value to generate another temporarily used random number N2, and the N2 is spliced to N1 and then the whole is encrypted with SK. Then send it back to the HSM hardware security module.
e. 將IC卡於第三回合送來的訊息以SK解密,取出N1及N2二個值,比對所取出的N1是否與原先於第二回合時所產生的N1相等,若N1不相符則協定中止;反之,若相等則將所解開的N2與所要傳送的資料EData疊接後以會議金鑰SK加密後傳給IC卡。另外,在IC卡方面,在收到前述訊息後以會議金鑰SK進行解密,將N2及EData解出,比對所取出的N2是否與第三回合 所產生的N2相等,若N2不相符則協定中止;反之,若相等則可確認EData的來源與正確性,協定運作完成。e. Decrypt the message sent by the IC card in the third round with SK, and take out the two values of N1 and N2, and compare whether the extracted N1 is equal to the original N1 generated in the second round. If N1 does not match, If the agreement is aborted, the N2 that is untied is overlapped with the data EData to be transmitted, and then encrypted by the conference key SK and transmitted to the IC card. In addition, in the case of the IC card, after receiving the above message, the conference key SK is used for decryption, and N2 and EData are solved, and whether the extracted N2 is compared with the third round. The generated N2 is equal. If N2 does not match, the agreement is aborted. Conversely, if they are equal, the source and correctness of EData can be confirmed, and the agreement is completed.
(2)協定可達成的安全要求:(2) Security requirements achievable by the agreement:
本協定之主要的功能為提供金鑰回復主控程式一個IC卡與HSM硬體安全模組間安全的交握協定,以Kr為彼此互認之信賴基礎,並協調一支用完即丟之會議金鑰SK,且用該把SK以確保其傳遞資料之私密性。The main function of this agreement is to provide a key agreement between the IC card and the HSM hardware security module for the key reply master program, and to use Kr as the basis for mutual recognition. Conference key SK, and use this to ensure the privacy of the data.
(3)安全性如下所述:(3) Security is as follows:
a. IC卡與HSM硬體安全模組兩方皆可確認會議金鑰SK的正確性且SK不可被除了IC卡及HSM以外的第三者推導而得。a. Both the IC card and the HSM hardware security module can confirm the correctness of the conference key SK and the SK cannot be derived from a third party other than the IC card and the HSM.
b. 其間承載的私密資料不可被除了IC卡及HSM以外的第三者推導而得。b. Private information carried during the period cannot be derived from a third party other than the IC card and HSM.
c. HSM硬體安全模組內用於加密金鑰資料的主鑰不可被除了HSM以外的任何人推導而得。c. The master key used to encrypt the key material in the HSM hardware security module cannot be derived by anyone other than the HSM.
請參閱圖四所示,為金鑰備份與回復一連貫完整流程與步驟的詳細描述,依序包含前置作業(金鑰預先產製)、金鑰備份發卡作業及金鑰回復作業,並透過金鑰備份與回復之安全通訊協定來串聯整個流程。完整金鑰備份與回復之流程描述如下:Please refer to Figure 4 for a detailed description of the complete process and steps of the key backup and reply, including the pre-job (key pre-production), key backup card issuing operation and key recovery operation. A secure communication protocol for key backup and reply to concatenate the entire process. The process of full key backup and reply is described as follows:
(1)前置作業(金鑰預先產製)41:(1) Pre-operation (key pre-production) 41:
a. 卡務管理中心(CMC)將加密金鑰回復協定金鑰(kkr)以及Key Recovery Applet寫入IC卡中。a. The Card Management Center (CMC) writes the encryption key reply agreement key (kkr) and the Key Recovery Applet to the IC card.
b. 金鑰回復中心(KRC)將金鑰回復協定金鑰(kr)用加密金鑰回復協定金鑰(kkr)加密後寫入卡管資料庫。b. The Key Recovery Center (KRC) encrypts the key reply agreement key (kr) with the encryption key reply protocol key (kkr) and writes it to the card management database.
c. 金鑰回復中心(KRC)將金鑰回復協定金鑰(kr)寫入硬體安全模組(HSM)中。c. The Key Recovery Center (KRC) writes the Key Recovery Agreement Key (kr) into the Hardware Security Module (HSM).
d. 硬體安全模組(HSM)以內部自行產生的金鑰(kh)對硬體安全模組(HSM)事先產生加解密的金鑰進行加密。d. The Hardware Security Module (HSM) encrypts the encryption and decryption keys generated by the hardware security module (HSM) with an internally generated key (kh).
(2)金鑰備份發卡作業42:(2) Key backup card issuing operation 42:
a. 透過金鑰備份與回復之安全通訊協定將硬體安全模組(HSM)事先產生加解密的金鑰(未以kh加密)寫入IC卡中。a. The secure communication protocol of the key backup and reply is written into the IC card by the hardware security module (HSM) to generate the encryption and decryption key (not encrypted in kh).
b. 將硬體安全模組(HSM)事先產生加解密的金鑰(以kh加密)寫入金鑰回復資料庫中。b. Write the encryption and decryption key (encrypted in kh) by the hardware security module (HSM) into the key reply database.
c. 從憑證管理中心儲存庫(Repository)將憑證下載與寫入IC卡中。c. Download and write the voucher from the voucher management repository (Repository) to the IC card.
(3)金鑰回復作業43:(3) Key Reply Job 43:
a. 金鑰回復中心(KRC)從金鑰回復資料庫中讀取硬體安全模組(HSM)事先產生加解密的金鑰(以kh加密)。a. The Key Recovery Center (KRC) reads the hardware security module (HSM) from the key reply database to generate the encryption and decryption key (encrypted in kh).
b. 透過金鑰備份與回復之安全通訊協定將硬體安全模組(HSM)事先產生加解密的金鑰(未以kh加密)寫入另一張IC卡中。b. The secure communication protocol for the key backup and reply is written to the other IC card by the hardware security module (HSM) to generate the encryption and decryption key (not encrypted in kh).
c. 從憑證管理中心儲存庫(Repository)將憑證下載與寫入另一張IC卡,完成金鑰回復。c. Download and write the voucher from the voucher management repository (Repository) to another IC card to complete the key reply.
本發明所提供之安全的金鑰回復方法,與其他習用技術相互比較時,更具有下列之優點:The safe key recovery method provided by the present invention has the following advantages when compared with other conventional technologies:
(1)本發明所建置的方法將傳統卡務管理中心獨立出來,卡務管理中心通常只管理IC卡,但是有關IC卡的金鑰設定及管理都由本安全的金鑰回復方法處理。(1) The method constructed by the present invention separates the traditional card management center, and the card management center usually only manages the IC card, but the key setting and management of the IC card are handled by the secure key reply method.
(2)本發明在金鑰的備份及回復作業所遵循之流程都有同出一脈之連貫關係,系統維運上較容易。(2) The process followed by the key backup and reply operations of the present invention has the same coherent relationship, and the system is easier to maintain.
(3)本發明以IC卡及硬體安全模組(HSM)作為安全的運作堡壘,傳輸上的通訊協定亦經過良善之安全設計,能夠有效防止內外部的中間人的攻擊。(3) The present invention uses an IC card and a hardware security module (HSM) as a secure operational bastion. The communication protocol on the transmission is also designed with good security, which can effectively prevent internal and external middlemen from attacking.
(4)本發明在系統安裝的初始化、申請金鑰回復、製發金鑰回復卡、回送金鑰回復卡,都有一個絕佳的安全處理程序。(4) The present invention has an excellent security processing procedure in system initialization initialization, application key reply, issuing key reply card, and return key reply card.
上列詳細說明係針對本發明之具體說明,惟該敘述並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。The detailed description of the present invention is intended to be illustrative of the invention, and is not intended to limit the scope of the invention.
綜上所述,本案不但在控管流程上確屬創新,並能較習用物品增進上述多項功效,應已充分符合新穎性及進步性之法定發明專利要件,爰依法提出申請,懇請 貴局核准本件發明專利申請案,以勵發明,至感德便。In summary, this case is not only innovative in the control process, but also can enhance the above-mentioned multiple functions compared with the customary items. It should fully comply with the statutory invention patent requirements of novelty and progress, and apply for it according to law. This invention patent application, in order to invent invention, to the sense of virtue.
11‧‧‧憑證管理中心儲存庫(Repository)11‧‧‧Voucher Management Center Repository
12‧‧‧稽核主機(Audit)12‧‧‧ Auditing Host (Audit)
13‧‧‧卡務管理中心(CMC)13‧‧‧Card Management Center (CMC)
14‧‧‧金鑰回復中心(KRC)14‧‧‧Key Recovery Center (KRC)
15‧‧‧金鑰回復資料庫15‧‧‧Key Reply Database
21‧‧‧金鑰回復中心(金鑰產製與回復寫卡)21‧‧‧Key Recall Center (Key Production and Reply Write)
22‧‧‧資料管理中心(共用DBMS)22‧‧‧Data Management Center (shared DBMS)
23‧‧‧卡務管理中心(Pre-perso)23‧‧‧Card Management Center (Pre-perso)
41‧‧‧前置作業(金鑰預先產製)41‧‧‧Pre-installation (key production)
42‧‧‧金鑰備份發卡作業42‧‧‧Key backup card issuing operation
43‧‧‧金鑰回復作業43‧‧‧Key Recovery
請參閱以下有關本發明之詳細流程說明及其附圖,將可進一步瞭解本發明之技術內容及其目的功效:圖一為安全的金鑰回復系統整體關係圖;圖二為金鑰備份角色關係與流程圖;圖三為金鑰備份與回復之安全通訊協定圖;以及圖四為金鑰備份與回復之流程圖。Please refer to the following detailed description of the process of the present invention and its accompanying drawings, which will further understand the technical contents of the present invention and its effects: FIG. 1 is a secure key recovery system overall relationship diagram; FIG. 2 is a key backup role relationship And the flow chart; Figure 3 is the secure communication protocol diagram of the key backup and reply; and Figure 4 is the flow chart of the key backup and reply.
11‧‧‧憑證管理中心儲存庫(Repository)11‧‧‧Voucher Management Center Repository
12‧‧‧稽核主機(Audit)12‧‧‧ Auditing Host (Audit)
13‧‧‧卡務管理中心(CMC)13‧‧‧Card Management Center (CMC)
14‧‧‧金鑰回復中心(KRC)14‧‧‧Key Recovery Center (KRC)
15‧‧‧金鑰回復資料庫15‧‧‧Key Reply Database
Claims (5)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW99133952A TWI430643B (en) | 2010-10-06 | 2010-10-06 | Secure key recovery system and method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW99133952A TWI430643B (en) | 2010-10-06 | 2010-10-06 | Secure key recovery system and method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW201216663A TW201216663A (en) | 2012-04-16 |
| TWI430643B true TWI430643B (en) | 2014-03-11 |
Family
ID=46787283
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW99133952A TWI430643B (en) | 2010-10-06 | 2010-10-06 | Secure key recovery system and method |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI430643B (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI606363B (en) * | 2016-11-07 | 2017-11-21 | Chunghwa Telecom Co Ltd | Key share system and method |
| TWI669628B (en) * | 2018-07-17 | 2019-08-21 | 關楗股份有限公司 | Token device for conducting cryptography key backup or restoration operation |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI578189B (en) * | 2015-04-07 | 2017-04-11 | Chunghwa Telecom Co Ltd | A virtual disk management system using a secure encryption device |
-
2010
- 2010-10-06 TW TW99133952A patent/TWI430643B/en not_active IP Right Cessation
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI606363B (en) * | 2016-11-07 | 2017-11-21 | Chunghwa Telecom Co Ltd | Key share system and method |
| TWI669628B (en) * | 2018-07-17 | 2019-08-21 | 關楗股份有限公司 | Token device for conducting cryptography key backup or restoration operation |
Also Published As
| Publication number | Publication date |
|---|---|
| TW201216663A (en) | 2012-04-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10439811B2 (en) | Method for securing a private key on a mobile device | |
| CN111971929B (en) | Secure distributed key management system | |
| CN106548345B (en) | Method and system for realizing block chain private key protection based on key partitioning | |
| CN107959567B (en) | Data storage method, data acquisition method, device and system | |
| CN106789052B (en) | Remote key issuing system based on quantum communication network and use method thereof | |
| TW201733302A (en) | Blockchain-based system combined with secure multi-party anti-lost storage and encryption key transfer in wallet management system | |
| CN106330868A (en) | Encrypted storage key management system and method of high-speed network | |
| US20220407691A1 (en) | Data protection and recovery systems and methods | |
| US8806206B2 (en) | Cooperation method and system of hardware secure units, and application device | |
| CN106897879A (en) | Block chain encryption method based on the PKI CLC close algorithms of isomerization polymerization label | |
| CN103580855A (en) | Usbkey management plan based on sharing technology | |
| CN108537537A (en) | A kind of safe and reliable digital cash Wallet System | |
| BE1024812A9 (en) | A SECURITY APPROACH FOR THE STORAGE OF CREDENTIALS FOR OFFLINE USE AND AGAINST COPY PROTECTED CLEAN CONTENT IN DEVICES | |
| CN111242611A (en) | Method and system for recovering digital wallet key | |
| US12217251B2 (en) | System and method for the protection of consumer financial data utilizing dynamic content shredding | |
| CN116232639A (en) | Data transmission method, device, computer equipment and storage medium | |
| TWI476629B (en) | Data security and security systems and methods | |
| WO2025148510A1 (en) | Authentication method based on dual quantum random number protection, client, and system | |
| CN107733936A (en) | A kind of encryption method of mobile data | |
| CN116827653B (en) | Data encryption and authorization management method based on Hyperledger Fabric alliance chain | |
| TWI430643B (en) | Secure key recovery system and method | |
| US10764260B2 (en) | Distributed processing of a product on the basis of centrally encrypted stored data | |
| CN116340331A (en) | A method and system for depositing certificates of large-scale instrument experiment results based on blockchain | |
| CN103916237A (en) | Method and system for managing user encrypted-key retrieval | |
| CN106953917B (en) | Method of data synchronization and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |