[go: up one dir, main page]

TWI430643B - Secure key recovery system and method - Google Patents

Secure key recovery system and method Download PDF

Info

Publication number
TWI430643B
TWI430643B TW99133952A TW99133952A TWI430643B TW I430643 B TWI430643 B TW I430643B TW 99133952 A TW99133952 A TW 99133952A TW 99133952 A TW99133952 A TW 99133952A TW I430643 B TWI430643 B TW I430643B
Authority
TW
Taiwan
Prior art keywords
key
card
reply
hsm
center
Prior art date
Application number
TW99133952A
Other languages
Chinese (zh)
Other versions
TW201216663A (en
Original Assignee
Chunghwa Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chunghwa Telecom Co Ltd filed Critical Chunghwa Telecom Co Ltd
Priority to TW99133952A priority Critical patent/TWI430643B/en
Publication of TW201216663A publication Critical patent/TW201216663A/en
Application granted granted Critical
Publication of TWI430643B publication Critical patent/TWI430643B/en

Links

Landscapes

  • Retry When Errors Occur (AREA)
  • Storage Device Security (AREA)

Description

安全的金鑰回復系統與方法Secure key recovery system and method

金鑰備份與回復,以避免加密資料的金鑰若遺失、損壞或遭竊時,無法將原本以加密的密文解密還原。並透過使用IC卡及硬體 安全模組(HSM)等高安全性加密載存裝置輔助的配合,讓金鑰回復系統在金鑰儲存、傳輸過程中更安全,不易被駭客破解。The key is backed up and replied to avoid decrypting and restoring the encrypted ciphertext if the key of the encrypted data is lost, damaged or stolen. And through the use of IC cards and hardware The security module (HSM) and other high-security encryption storage devices assist the key recovery system in the process of key storage and transmission, and it is not easy to be cracked by hackers.

過去的金鑰回復技術包括卡務管理中心、金鑰保管中心及金鑰回復中心,金鑰回復機制僅負責加解密用金鑰對之私密金鑰的金鑰回復需求,每張IC卡中含有的兩組金鑰對:簽章用的金鑰對、加解密用金鑰對。The past key reply technology includes the card management center, the key custodian center and the key reply center. The key reply mechanism is only responsible for the key recovery request of the private key of the encryption and decryption key, and each IC card contains Two sets of key pairs: the key pair used for signing, and the key pair for encryption and decryption.

過去的卡務管理中心包含一個硬體安全模組(HSM),一個負責操作管理硬體安全模組及IC卡產製作業的主控台PC,在卡務管理中心的硬體安全模組,將負責終端使用者(以下稱:EE)加解密金鑰對產製以及加解密私鑰的分持加密作業,卡務管理中心將加解密私鑰分持加密送到位在不同的網段之金鑰保管中心,且必須經由加密的安全通道(例如:SSL)傳送資料到金鑰保管中心的各個金鑰儲存系統。硬體安全模組(HSM)連接金鑰載具時,潛在的問題有:一、金鑰載具中的重要訊息如何傳給硬體安全模組。二、如何讓硬體安全模組(HSM)能依金鑰載具中重要訊息更換以作簽章。三、金鑰載具能否在其內部將加密過的EE加解密私鑰作解密。四、金鑰載具能否在其內部,自行將解密後的EE加解密私鑰存入其內部。五、卡務管理中心與金鑰回復的權責劃分不明,運作程序較為複雜。In the past, the card management center included a hardware security module (HSM), a console PC that manages the hardware security module and IC card production operations, and a hardware security module in the card management center. Will be responsible for the end user (hereinafter referred to as: EE) encryption and decryption key to the production system and the encryption and decryption of the private key of the encryption operation, the card management center will encrypt and decrypt the private key share encryption to send the gold in different network segments The key custodian is located and must transfer data to each key storage system of the key custodian via an encrypted secure channel (eg SSL). When the hardware security module (HSM) is connected to the key carrier, the potential problems are as follows: 1. How important information in the key carrier is transmitted to the hardware security module. Second, how to make the hardware security module (HSM) replace the important information in the key carrier for signature. 3. Whether the key carrier can decrypt the encrypted EE encryption and decryption private key within it. 4. Whether the key carrier can internally store the decrypted EE encryption and decryption private key in its own. 5. The division of powers and responsibilities of the card management center and the key recovery is unclear, and the operational procedures are more complicated.

過去的金鑰保管中心包含複數個金鑰儲存系統,每個金鑰儲存系統負責將每個EE解密私鑰分割並加密後的分持金鑰儲存保管。每個金鑰儲存系統包含一個金鑰回復中心(以下稱:KRC)。金鑰儲存系統只儲存加密後的分持金鑰,不儲存未加密的資料。金 鑰儲存系統不具備將所儲存的加密分持金鑰解密並組合的功能。金鑰儲存系統只能接受並儲存從卡務管理中心傳來的加密後的分持金鑰。金鑰儲存系統只能把加密分持金鑰傳送給金鑰回復中心。金鑰保管中心的複數個金鑰儲存系統可能分別設置在不同的地理位置。The past key storage center includes a plurality of key storage systems, and each key storage system is responsible for storing and storing each of the EE decryption private keys and encrypting the shared key. Each key storage system contains a key reply center (hereinafter referred to as: KRC). The key storage system only stores the encrypted distribution key and does not store unencrypted data. gold The key storage system does not have the function of decrypting and combining the stored encrypted share keys. The key storage system can only accept and store the encrypted distribution key from the card management center. The key storage system can only transfer the encrypted distribution key to the key recovery center. The multiple key storage systems of the Key Custody Center may be set in different geographical locations.

過去的金鑰回復中心包含一個硬體安全模組(HSM),一個負責操作管理硬體安全模組(HSM)及金鑰回復作業的主控台PC。在金鑰回復中心的硬體安全模組(HSM),負責把分持加密的資料解密並組合成EE加解密私鑰以寫回IC卡的金鑰回復作業。依據IC卡資訊(如:IC卡卡號)從金鑰保管中心的複數個金鑰儲存系統,分別取得對應該IC卡的複數個加密分割的EE解密私鑰資料,金鑰回復中心內的的硬體安全模組(HSM)用其KRC私鑰把複數個加密分割的EE解密私鑰資料的每個部分作解密,硬體安全模組(HSM)把EE解密私鑰的複數個分割部分組合成原本的EE解密私鑰,硬體安全模組(HSM)直接把金鑰回復機制作出的EE解密私鑰寫入金鑰回復專用IC卡。如果金鑰回復中心和金鑰保管中心位在不同的網段,則必須經由加密的安全通道(例如:SSL),從金鑰保管中心中複數個金鑰儲存系統傳送資料到金鑰回復中心。潛在的問題有:一、若KRC的硬體安全模組(HSM)是分成兩部以上運作,每部各自處理來自金鑰保管中心的加密分持私鑰,則當兩部以上硬體安全模組(HSM)個別解密後,要如何安全地彙集各自解密後的分持私鑰並組合成一個EE私密金鑰。二、可能遭受中間人攻擊。過去的金鑰回復技術尚無法有效解決此問題。The past key recovery center included a hardware security module (HSM), a console PC that handles the management of hardware security modules (HSMs) and key recovery operations. The hardware security module (HSM) in the key recovery center is responsible for decrypting and combining the encrypted data into EE encryption and decryption private keys to write back the key recovery operation of the IC card. According to the IC card information (such as the IC card number), the EE decryption private key data corresponding to the plurality of encrypted segments of the IC card is obtained from the plurality of key storage systems of the key storage center, and the key is restored in the center. The Body Security Module (HSM) decrypts each part of the EE decrypted private key data with a plurality of encrypted partitions using its KRC private key, and the hardware security module (HSM) combines the plurality of split parts of the EE decrypted private key into The original EE decryption private key, the hardware security module (HSM) directly writes the EE decryption private key made by the key reply mechanism to the key recovery dedicated IC card. If the key reply center and the key custodian are located on different network segments, the data must be transmitted from the key storage system in the key custodian to the key replies via an encrypted secure channel (for example, SSL). The potential problems are as follows: 1. If the KRC hardware security module (HSM) is divided into two or more operations, each of which handles the encrypted private key from the key storage center, then two or more hardware security modules. After the individual (HSM) decryption, how to securely collect the decrypted private keys and combine them into an EE private key. Second, may suffer from man-in-the-middle attacks. Past key recovery techniques have not been able to effectively solve this problem.

由於傳統金鑰回復機制仍存在許多安全漏洞及駭客攻防的討論議題,因此本安全的金鑰回復方法特別針對這些問題做修正,並 研討出更為安穩、堅固及安全的新世代金鑰回復概念。Since the traditional key reply mechanism still has many security vulnerabilities and discussion topics of hacker attack and defense, this security key recovery method specifically corrects these problems, and Explore the concept of a new generation of key recovery that is more secure, robust and secure.

由此可見,上述習用方式仍有缺失,實非一良善之設計,而亟待加以改良。It can be seen that the above-mentioned conventional methods are still missing, which is not a good design, and needs to be improved.

本發明鑑於上述習用方式所衍生的各項缺點,乃亟思加以改良創新,並經苦心孤詣潛心研究後,終於成功研發完成本一種安全的金鑰回復方法。In view of the shortcomings derived from the above-mentioned conventional methods, the present invention has been improved and innovated, and after painstaking research, finally successfully developed a safe key recovery method.

本發明之目的乃在提供一種安全的金鑰回復系統與方法,以提升金鑰回復的安全性,避免金鑰在回復的過程中被中介程式惡意之攻擊,取得備份/回復之金鑰明文。The purpose of the present invention is to provide a secure key recovery system and method for improving the security of key recovery, avoiding malicious attacks by the intermediary program in the process of replying, and obtaining the clear/response key plaintext.

達成上述發明目的之一種安全的金鑰回復系統與方法,使得任一中介程式在金鑰回復過程中無法取得備份/回復之金鑰明文,本發明利用IC晶片卡及HSM來輔助安全金鑰回復系統與方法之建立,為了達成本發明目的之安全的金鑰回復方法,其中該發明內容包括:一、金鑰備份技術;二、金鑰回復技術;三、金鑰備份與回復之安全通訊協定。A secure key recovery system and method for achieving the above object, so that any intermediary program cannot obtain the backup/restore key plaintext during the key reply process, and the present invention utilizes the IC chip card and the HSM to assist the security key reply. System and method for establishing a secure key recovery method for achieving the purpose of the present invention, wherein the invention includes: 1. a key backup technology; 2. a key reply technology; and a secure communication protocol for key backup and reply. .

(1)金鑰備份技術,主要的運作角色包含金鑰回復中心(KRC)及卡務管理中心(CMC),金鑰回復中心與卡務管理中心共用其資料庫,各自使用各自的資料表互不交錯干擾;(2)金鑰回復技術,包含憑證管理中心儲存庫(Repository)、卡務管理中心及金鑰回復中心的詳細運作程序;(3)金鑰備份與回復之安全通訊協定,包含安全協定的演算流程。(1) Key backup technology, the main operational roles include Key Responsive Center (KRC) and Card Management Center (CMC). The Key Retrieval Center and the Card Management Center share their databases, each using their own data sheets. (2) Key recovery technology, including the detailed operation procedures of the Credential Management Center Repository, the Card Management Center and the Key Retrieval Center; (3) The secure communication protocol for key backup and reply, including The calculation process of the safety agreement.

請參閱圖一所示,為安全的金鑰回復系統整體關係圖,其實施之角色包括:Please refer to Figure 1 for the security key recovery system overall relationship diagram, its implementation role includes:

(1)憑證管理中心儲存庫(Repository)11,憑證管理中心儲存庫主要提供金鑰回復中心下載憑證、狀態查詢、金鑰回復申請單下載及相關公告之服務。(1) The voucher management center repository (Repository) 11 , the voucher management center repository mainly provides the key reply center download voucher, status query, key reply request form download and related announcement service.

(2)稽核主機(Audit)12,稽核主機主要記錄金鑰備份與金鑰回復時運作之重要資料,並提供相關之安全稽核查詢。(2) Auditing host (Audit) 12, the auditing host mainly records the important information of the operation of the key backup and key reply, and provides relevant security audit inquiry.

(3)卡務管理中心(CMC)13:(3) Card Management Center (CMC) 13:

a. 卡務管理中心將金鑰回復中心所產製之HSM與IC卡間互認之回復金鑰Kr(此金鑰專門使用於金鑰回復協定,以下以Kr專指此協定金鑰)經另一把加解密金鑰KKr(專門用於加解密Kr,以下簡稱KKr)加密的資料,存放入卡管資料庫中,並將加解密金鑰KKr寫入IC卡內,至於回復金鑰Kr在金鑰回復中心則是利用A/B金鑰分持碼單,將回復金鑰Kr寫入HSM,避免金鑰的暴露。a. The card management center will reply the key to the mutual authentication between the HSM and the IC card produced by the key recovery center (this key is used exclusively for the key reply agreement, the following is specifically referred to as the agreement key by Kr) Another data encrypted by the encryption and decryption key KKr (specifically used for encryption and decryption Kr, hereinafter referred to as KKr) is stored in the card management database, and the encryption and decryption key KKr is written into the IC card. As for the reply key Kr In the key reply center, the A/B key is used to share the code list, and the reply key Kr is written into the HSM to avoid the exposure of the key.

b. 提供已初始化之空白IC卡給金鑰回復中心進行金鑰備份與回復之用,該IC卡已寫入金鑰備份/回復所需之IC卡專用程式(以下簡稱Applet)與被加解密金鑰KKr所加密的Kr資料。b. Provide the initialized blank IC card to the key recovery center for key backup and reply. The IC card has been written into the key card special program (hereinafter referred to as Applet) and encrypted and decrypted. The Kr data encrypted by the key KKr.

(4)金鑰回復中心(KRC)14,金鑰回復中心為主要進行金鑰備份與回復之主要核心,於發卡時進行金鑰之備份;於金鑰回復時,進行申請作業之審核,接著進行金鑰回復寫卡與印製。(4) Key Responsive Center (KRC) 14. The key reply center is the main core for key backup and reply, and the key is backed up when the card is issued. When the key is replied, the application operation is reviewed, and then The key is replied to the card and printed.

(5)金鑰回復資料庫15,金鑰回復資料庫主要儲存備份之金鑰 與進行金鑰回復之相關資料。(5) Key reply database 15, the key reply database mainly stores the backup key Information related to the key reply.

請參閱圖二所示,為金鑰備份角色關係與流程圖,其實施之角色包括:金鑰回復中心(金鑰產製與回復寫卡)21、資料管理中心(共用DBMS)22、卡務管理中心(個人化的預處理)23。Please refer to Figure 2, for the key backup role relationship and flow chart, the implementation role includes: key recovery center (key production and reply write card) 21, data management center (shared DBMS) 22, card service Management Center (personalized pre-processing) 23.

主要的運作角色有二個:金鑰回復中心及卡務管理中心,金鑰回復中心與卡務管理中心共用其資料庫,各自使用各自的資料表互不交錯干擾。金鑰備份發卡之進行必須完成以下之前置作業:There are two main operational roles: the Key Responsive Center and the Card Management Center. The Key Responsive Center and the Card Management Center share their databases, each using their own data sheets without interlacing. The key backup must be completed before the key backup card is issued:

(1)金鑰回復中心之HSM與待發卡的IC卡中都有一把相同的資料加密對稱金鑰(Kr),以用於金鑰備份或回復時HSM與IC卡互認之信賴基礎:(1) The HSM of the key reply center and the IC card of the pending card all have the same data encryption symmetric key (Kr), which is used for the trust basis of HSM and IC card mutual recognition when the key is backed up or restored:

a. 總共有n把,HSM內含n把Kr,分別為Kr1,Kr2,...,Krn,而IC卡內只有一把加解密Kr的金鑰(KKr)。There are a total of n, HSM contains n Kr, respectively Kr1, Kr2, ..., Krn, and there is only one key in the IC card to decrypt and decrypt Kr (KKr).

b. 每批IC卡以卡號對應卡管資料庫中的某把Krj,取出卡管資料庫中對應的用KKr加密後的Krj,利用卡片中之KKr解密,得出Krj,會與HSM內之Kr1至Krn內某一把相同。b. Each batch of IC card corresponds to a Krj in the card management database with the card number, and the corresponding Krj encrypted by KKr in the card management database is retrieved, and the Krj is decrypted by the KKr in the card to obtain Krj, which will be in the HSM. One of Kr1 to Krn is the same.

c. n把Kr由金鑰回復中心產生,並用A/B金鑰分持碼單將Kr寫入HSM,並將n把Kr用KKr加密後資料送至卡務管理中心存入卡管資料庫。c. nKr is generated by the key recovery center, and Kr is written into the HSM by the A/B key, and the data is sent to the card management center by the Kr. .

(2)在開始洗卡時卡務管理中心就將含有KKr的Key Recovery Applet寫到IC卡中,而金鑰回復中心也會事先以A/B金鑰分持碼單將n把Kr寫入金鑰回復中心HSM內,每把Key對應到乙批IC卡,每批IC卡以卡號對應其內之Kr。(2) At the beginning of the card washing, the card management center will write the Key Recovery Applet containing KKr to the IC card, and the key recovery center will also write the Kr in advance with the A/B key. In the key recovery center HSM, each key corresponds to the B batch of IC cards, and each batch of IC cards corresponds to the Kr within the card number.

(3)金鑰回復中心之HSM硬體安全模組事先產生加解密的金 鑰以HSM硬體安全模組內部自行產生的金鑰Kh(此保密金鑰專門用於保密重要資料,且僅存在於HSM內,以Kh表示)進行加密,並將加過密的金鑰滙出至金鑰回復中心之硬碟以便事後大量寫入IC卡內。(3) The HSM hardware security module of the key recovery center generates the encryption and decryption gold in advance. The key is encrypted by the internal key Kh generated by the HSM hardware security module (this secret key is used exclusively for confidential important information and exists only in the HSM, denoted by Kh), and the key is added. The hard disk to the key recovery center is frequently written into the IC card afterwards.

待前置作業完成後進行發卡階段之金鑰備份,流程概述如下:After the pre-operation is completed, the key backup in the card issuance phase is completed. The process is summarized as follows:

(1)金鑰回復中心首先將已授權的操作卡插入HSM內。(1) The Key Retrieval Center first inserts the authorized operation card into the HSM.

(2)再插入含有可計算出待寫卡之SO(Super Officer)PIN碼的SAM卡。(2) Reinsert the SAM card containing the SO (Super Officer) PIN code that can calculate the card to be written.

(3)驗證PIN碼後,將先前準備好的IC卡(已將KKr與Key Recovery Applet寫入的IC卡)置入讀卡機內。(3) After verifying the PIN code, the previously prepared IC card (the IC card that has been written by KKr and Key Recovery Applet) is placed in the card reader.

(4)執行HSM與IC卡(Key Recovery Applet)間發卡階段之金鑰備份協定,將先前預先產生的加解密金鑰寫入IC卡內正確的Key container中。(4) Perform a key backup agreement between the HSM and the Key Recovery Applet in the card issuance phase, and write the previously generated encryption and decryption key into the correct Key container in the IC card.

(5)之後將使用HSM之Kh加密過的加解密金鑰,再使用加密程式寫至共用資料庫內,作為後續金鑰回復之用。(5) Afterwards, the encryption and decryption key encrypted by Kh of HSM will be used, and then the encryption program is used to write to the shared database for use as a subsequent key reply.

請參閱圖三所示,為金鑰備份與回復之安全通訊協定圖,為橋接HSM硬體安全模組與IC卡使其二個「被動式」元件間能安全地完成寫入金鑰的動作,必須設計一個可抵禦第三者之協定。整個金鑰備份與回復之安全通訊協定之技術描述如下:Referring to FIG. 3, the secure communication protocol diagram for the key backup and reply is to bridge the HSM hardware security module and the IC card to securely write the key between the two "passive" components. An agreement to defend against third parties must be designed. The technical description of the secure communication protocol for the entire key backup and reply is as follows:

(1)協定運作解說:(1) Explanation of the operation of the agreement:

a. 起始狀態:HSM和IC卡共享一把只有對方才知道的回復金鑰Kr,該把Kr將作為雙方交握之認證基礎以及秘密傳遞資料之加解密金鑰,長度為192bits(可依需求定義),且各自保存在HSM硬體安全模組與IC卡內部,不可被竊取或竄改。本協定使用的加解密演算法為AES 對稱式加解密演算法(亦可採用其它對稱式加解密演算法)。圖中E(.)及D(.)代表加密與解密,而在E(.)和D(.)之下標代表使用的Key,””代表將資料疊接起來。此外,本協定雙方間的任何訊息傳遞,皆是先傳送給中介程式,再透過中介程式轉傳給對方的意思。a. Starting state: HSM and IC card share a reply key Kr that only the other party knows. This Kr will be used as the authentication basis for both parties and the encryption and decryption key for secretly transmitting data. The length is 192bits. Requirements definition), and each is stored inside the HSM hardware security module and IC card, and cannot be stolen or tampered with. The encryption and decryption algorithm used in this protocol is the AES symmetric encryption and decryption algorithm (other symmetric encryption and decryption algorithms can also be used). In the figure, E(.) and D(.) represent encryption and decryption, and under E(.) and D(.), the key is used." "The representative embosses the information. In addition, any message between the parties to this Agreement is transmitted to the intermediary program and then passed to the other party through the intermediary program.

b. 第一回合:IC卡先用安全的亂數產生器產生一個當次使用的會議金鑰SK,長度為192bits,接下來用本身與對方才知道的回復金鑰Kr以AES演算法加密會議金鑰SK,並將之傳送給HSM硬體安全模組。b. The first round: The IC card first uses a secure random number generator to generate a conference key SK for the current use, which is 192 bits long. Then, the AES algorithm is used to encrypt the conference with the reply key Kr that is known to the other party. The key SK is transmitted to the HSM hardware security module.

c. 第二回合:HSM硬體安全模組以回復金鑰Kr以AES演算法進行解密,解出會議金鑰SK,接下來產生一個臨時使用的亂數值(即Nonce)N1,並以前面剛解出的會議金鑰SK做為加密的金鑰,加密N1後「傳送」給IC卡。c. The second round: the HSM hardware security module decrypts the key Kr with the AES algorithm, solves the conference key SK, and then generates a temporary used random number (Nonce) N1, and The solved conference key SK is used as an encrypted key, and is encrypted and transmitted to the IC card.

d. 第三回合:IC卡以先前產生的SK解密HSM傳來的ESK(N1),解出N1值後產生另一個臨時使用的亂數值N2,並將N2疊接於N1後整個以SK加密後回送給HSM硬體安全模組。d. The third round: the IC card uses the ESK (N1) transmitted from the previously generated SK decryption HSM, and solves the N1 value to generate another temporarily used random number N2, and the N2 is spliced to N1 and then the whole is encrypted with SK. Then send it back to the HSM hardware security module.

e. 將IC卡於第三回合送來的訊息以SK解密,取出N1及N2二個值,比對所取出的N1是否與原先於第二回合時所產生的N1相等,若N1不相符則協定中止;反之,若相等則將所解開的N2與所要傳送的資料EData疊接後以會議金鑰SK加密後傳給IC卡。另外,在IC卡方面,在收到前述訊息後以會議金鑰SK進行解密,將N2及EData解出,比對所取出的N2是否與第三回合 所產生的N2相等,若N2不相符則協定中止;反之,若相等則可確認EData的來源與正確性,協定運作完成。e. Decrypt the message sent by the IC card in the third round with SK, and take out the two values of N1 and N2, and compare whether the extracted N1 is equal to the original N1 generated in the second round. If N1 does not match, If the agreement is aborted, the N2 that is untied is overlapped with the data EData to be transmitted, and then encrypted by the conference key SK and transmitted to the IC card. In addition, in the case of the IC card, after receiving the above message, the conference key SK is used for decryption, and N2 and EData are solved, and whether the extracted N2 is compared with the third round. The generated N2 is equal. If N2 does not match, the agreement is aborted. Conversely, if they are equal, the source and correctness of EData can be confirmed, and the agreement is completed.

(2)協定可達成的安全要求:(2) Security requirements achievable by the agreement:

本協定之主要的功能為提供金鑰回復主控程式一個IC卡與HSM硬體安全模組間安全的交握協定,以Kr為彼此互認之信賴基礎,並協調一支用完即丟之會議金鑰SK,且用該把SK以確保其傳遞資料之私密性。The main function of this agreement is to provide a key agreement between the IC card and the HSM hardware security module for the key reply master program, and to use Kr as the basis for mutual recognition. Conference key SK, and use this to ensure the privacy of the data.

(3)安全性如下所述:(3) Security is as follows:

a. IC卡與HSM硬體安全模組兩方皆可確認會議金鑰SK的正確性且SK不可被除了IC卡及HSM以外的第三者推導而得。a. Both the IC card and the HSM hardware security module can confirm the correctness of the conference key SK and the SK cannot be derived from a third party other than the IC card and the HSM.

b. 其間承載的私密資料不可被除了IC卡及HSM以外的第三者推導而得。b. Private information carried during the period cannot be derived from a third party other than the IC card and HSM.

c. HSM硬體安全模組內用於加密金鑰資料的主鑰不可被除了HSM以外的任何人推導而得。c. The master key used to encrypt the key material in the HSM hardware security module cannot be derived by anyone other than the HSM.

請參閱圖四所示,為金鑰備份與回復一連貫完整流程與步驟的詳細描述,依序包含前置作業(金鑰預先產製)、金鑰備份發卡作業及金鑰回復作業,並透過金鑰備份與回復之安全通訊協定來串聯整個流程。完整金鑰備份與回復之流程描述如下:Please refer to Figure 4 for a detailed description of the complete process and steps of the key backup and reply, including the pre-job (key pre-production), key backup card issuing operation and key recovery operation. A secure communication protocol for key backup and reply to concatenate the entire process. The process of full key backup and reply is described as follows:

(1)前置作業(金鑰預先產製)41:(1) Pre-operation (key pre-production) 41:

a. 卡務管理中心(CMC)將加密金鑰回復協定金鑰(kkr)以及Key Recovery Applet寫入IC卡中。a. The Card Management Center (CMC) writes the encryption key reply agreement key (kkr) and the Key Recovery Applet to the IC card.

b. 金鑰回復中心(KRC)將金鑰回復協定金鑰(kr)用加密金鑰回復協定金鑰(kkr)加密後寫入卡管資料庫。b. The Key Recovery Center (KRC) encrypts the key reply agreement key (kr) with the encryption key reply protocol key (kkr) and writes it to the card management database.

c. 金鑰回復中心(KRC)將金鑰回復協定金鑰(kr)寫入硬體安全模組(HSM)中。c. The Key Recovery Center (KRC) writes the Key Recovery Agreement Key (kr) into the Hardware Security Module (HSM).

d. 硬體安全模組(HSM)以內部自行產生的金鑰(kh)對硬體安全模組(HSM)事先產生加解密的金鑰進行加密。d. The Hardware Security Module (HSM) encrypts the encryption and decryption keys generated by the hardware security module (HSM) with an internally generated key (kh).

(2)金鑰備份發卡作業42:(2) Key backup card issuing operation 42:

a. 透過金鑰備份與回復之安全通訊協定將硬體安全模組(HSM)事先產生加解密的金鑰(未以kh加密)寫入IC卡中。a. The secure communication protocol of the key backup and reply is written into the IC card by the hardware security module (HSM) to generate the encryption and decryption key (not encrypted in kh).

b. 將硬體安全模組(HSM)事先產生加解密的金鑰(以kh加密)寫入金鑰回復資料庫中。b. Write the encryption and decryption key (encrypted in kh) by the hardware security module (HSM) into the key reply database.

c. 從憑證管理中心儲存庫(Repository)將憑證下載與寫入IC卡中。c. Download and write the voucher from the voucher management repository (Repository) to the IC card.

(3)金鑰回復作業43:(3) Key Reply Job 43:

a. 金鑰回復中心(KRC)從金鑰回復資料庫中讀取硬體安全模組(HSM)事先產生加解密的金鑰(以kh加密)。a. The Key Recovery Center (KRC) reads the hardware security module (HSM) from the key reply database to generate the encryption and decryption key (encrypted in kh).

b. 透過金鑰備份與回復之安全通訊協定將硬體安全模組(HSM)事先產生加解密的金鑰(未以kh加密)寫入另一張IC卡中。b. The secure communication protocol for the key backup and reply is written to the other IC card by the hardware security module (HSM) to generate the encryption and decryption key (not encrypted in kh).

c. 從憑證管理中心儲存庫(Repository)將憑證下載與寫入另一張IC卡,完成金鑰回復。c. Download and write the voucher from the voucher management repository (Repository) to another IC card to complete the key reply.

本發明所提供之安全的金鑰回復方法,與其他習用技術相互比較時,更具有下列之優點:The safe key recovery method provided by the present invention has the following advantages when compared with other conventional technologies:

(1)本發明所建置的方法將傳統卡務管理中心獨立出來,卡務管理中心通常只管理IC卡,但是有關IC卡的金鑰設定及管理都由本安全的金鑰回復方法處理。(1) The method constructed by the present invention separates the traditional card management center, and the card management center usually only manages the IC card, but the key setting and management of the IC card are handled by the secure key reply method.

(2)本發明在金鑰的備份及回復作業所遵循之流程都有同出一脈之連貫關係,系統維運上較容易。(2) The process followed by the key backup and reply operations of the present invention has the same coherent relationship, and the system is easier to maintain.

(3)本發明以IC卡及硬體安全模組(HSM)作為安全的運作堡壘,傳輸上的通訊協定亦經過良善之安全設計,能夠有效防止內外部的中間人的攻擊。(3) The present invention uses an IC card and a hardware security module (HSM) as a secure operational bastion. The communication protocol on the transmission is also designed with good security, which can effectively prevent internal and external middlemen from attacking.

(4)本發明在系統安裝的初始化、申請金鑰回復、製發金鑰回復卡、回送金鑰回復卡,都有一個絕佳的安全處理程序。(4) The present invention has an excellent security processing procedure in system initialization initialization, application key reply, issuing key reply card, and return key reply card.

上列詳細說明係針對本發明之具體說明,惟該敘述並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。The detailed description of the present invention is intended to be illustrative of the invention, and is not intended to limit the scope of the invention.

綜上所述,本案不但在控管流程上確屬創新,並能較習用物品增進上述多項功效,應已充分符合新穎性及進步性之法定發明專利要件,爰依法提出申請,懇請 貴局核准本件發明專利申請案,以勵發明,至感德便。In summary, this case is not only innovative in the control process, but also can enhance the above-mentioned multiple functions compared with the customary items. It should fully comply with the statutory invention patent requirements of novelty and progress, and apply for it according to law. This invention patent application, in order to invent invention, to the sense of virtue.

11‧‧‧憑證管理中心儲存庫(Repository)11‧‧‧Voucher Management Center Repository

12‧‧‧稽核主機(Audit)12‧‧‧ Auditing Host (Audit)

13‧‧‧卡務管理中心(CMC)13‧‧‧Card Management Center (CMC)

14‧‧‧金鑰回復中心(KRC)14‧‧‧Key Recovery Center (KRC)

15‧‧‧金鑰回復資料庫15‧‧‧Key Reply Database

21‧‧‧金鑰回復中心(金鑰產製與回復寫卡)21‧‧‧Key Recall Center (Key Production and Reply Write)

22‧‧‧資料管理中心(共用DBMS)22‧‧‧Data Management Center (shared DBMS)

23‧‧‧卡務管理中心(Pre-perso)23‧‧‧Card Management Center (Pre-perso)

41‧‧‧前置作業(金鑰預先產製)41‧‧‧Pre-installation (key production)

42‧‧‧金鑰備份發卡作業42‧‧‧Key backup card issuing operation

43‧‧‧金鑰回復作業43‧‧‧Key Recovery

請參閱以下有關本發明之詳細流程說明及其附圖,將可進一步瞭解本發明之技術內容及其目的功效:圖一為安全的金鑰回復系統整體關係圖;圖二為金鑰備份角色關係與流程圖;圖三為金鑰備份與回復之安全通訊協定圖;以及圖四為金鑰備份與回復之流程圖。Please refer to the following detailed description of the process of the present invention and its accompanying drawings, which will further understand the technical contents of the present invention and its effects: FIG. 1 is a secure key recovery system overall relationship diagram; FIG. 2 is a key backup role relationship And the flow chart; Figure 3 is the secure communication protocol diagram of the key backup and reply; and Figure 4 is the flow chart of the key backup and reply.

11‧‧‧憑證管理中心儲存庫(Repository)11‧‧‧Voucher Management Center Repository

12‧‧‧稽核主機(Audit)12‧‧‧ Auditing Host (Audit)

13‧‧‧卡務管理中心(CMC)13‧‧‧Card Management Center (CMC)

14‧‧‧金鑰回復中心(KRC)14‧‧‧Key Recovery Center (KRC)

15‧‧‧金鑰回復資料庫15‧‧‧Key Reply Database

Claims (5)

一種安全的金鑰回復系統,其特徵係利用IC卡及硬體安全模組(HSM)輔助安全的金鑰回復方法之建立,其中包括:(a)一金鑰回復中心,係為金鑰備份與回復,於發卡時執行金鑰之備份,且於該金鑰回復時,執行申請作業之審核,以及執行金鑰回復寫卡與印製;(b)一金鑰回復資料庫,係以儲存備份之金鑰與進行金鑰回復之相關資料;(c)一卡務管理中心,係提供已初始化且將加解密金鑰KKr寫入IC卡內之空白IC卡給金鑰回復中心進行金鑰備份與回復;(d)一憑證管理中心儲存庫,係提供該金鑰回復中心下載憑證、狀態查詢、金鑰回復申請單下載及相關公告;(e)一稽核主機,係為記錄金鑰備份與金鑰回復時運作之重要資料,並提供相關之安全稽核查詢。 A secure key recovery system characterized by the use of an IC card and a hardware security module (HSM) to assist in the establishment of a secure key recovery method, including: (a) a key reply center, which is a key backup And reply, perform the backup of the key at the time of issuance, and when the key is replied, perform the review of the application operation, and perform the key reply to write the card and print; (b) a key reply database is stored The backup key and the data related to the key reply; (c) a card management center provides a blank IC card that has been initialized and writes the encryption/decryption key KKr into the IC card to the key recovery center for the key Backup and reply; (d) a voucher management center repository, providing the key reply center download voucher, status query, key reply request form download and related announcement; (e) an audit host, which is a record key backup It is important information to operate with the key and provide relevant security audit inquiries. 一種安全的金鑰回復方法,其中係包括:(a)金鑰備份技術,係為金鑰回復中心(金鑰產製與回復寫卡)、資料管理中心(共用DBMS)、卡務管理中心之運作,金鑰回復中心之HSM硬體安全模組與經過卡務管理中心洗卡的IC卡,通過發卡階段之金鑰備份協定,將金鑰回復中心預先產生的加解密金鑰寫入IC卡內,且亦將加密過的加解密金鑰寫入資料管理中心之金鑰回復資料庫內備份,並將憑證下載與寫入IC卡內;(b)金鑰回復技術,包含憑證管理中心儲存庫、卡務管理中心及金鑰回復中心之運作,金鑰回復中心之HSM硬體安 全模組與經過卡務管理中心洗卡的回復用IC卡,透過金鑰備份與回復之安全通訊協定,將金鑰回復資料庫中備份的加密過的加解密金鑰寫入回復用IC卡,並從憑證管理中心儲存庫將憑證下載與寫入IC卡內;以及(c)金鑰備份與回復之安全通訊協定,係包含安全協定的演算流程,首先,IC卡使用金鑰回復協定金鑰以AES對稱式加解密演算法(亦可採用其它對稱式加解密演算法)加密隨機產生會議金鑰,之後,HSM硬體安全模組與IC卡使用隨機產生的會議金鑰加密隨機產生亂數值或疊接的隨機產生亂數值,收送雙方均確認彼此後,HSM硬體安全模組才以隨機產生的會議金鑰加密所要傳送的資料給IC卡。 A secure key recovery method includes: (a) key backup technology, which is a key recovery center (key production and reply write card), a data management center (shared DBMS), and a card management center. Operation, the HSM hardware security module of the key recovery center and the IC card washed by the card management center, through the key backup agreement in the card issuance stage, write the encryption and decryption key pre-generated by the key recovery center into the IC card. Internally, the encrypted encryption/decryption key is also written into the data recovery center of the data management center for backup, and the certificate is downloaded and written into the IC card; (b) the key recovery technology, including the certificate management center storage The operation of the library, the card management center and the key recovery center, the HSM hardware of the key recovery center The full module and the IC card for replying through the card management center are used to write the encrypted encryption/decryption key backed up in the database to the reply IC card through the secure communication protocol of the key backup and reply. And downloading and writing the voucher from the voucher management center repository to the IC card; and (c) the secure communication protocol for the key backup and reply, including the calculation process of the security agreement. First, the IC card uses the key to reply to the agreement. The key is encrypted by the AES symmetric encryption and decryption algorithm (other symmetric encryption and decryption algorithms can also be used) to generate the conference key. After that, the HSM hardware security module and the IC card use the randomly generated conference key to encrypt and randomly generate the chaos. The value or the splicing randomly generates random values. After both the receiving and the receiving parties confirm each other, the HSM hardware security module encrypts the information to be transmitted to the IC card with the randomly generated conference key. 如申請專利範圍第2項所述之安全的金鑰回復方法,其中金鑰備份技術依序為:a. 發卡進行之前置作業(a)金鑰回復中心之HSM與卡務管理中心都有一把相同的金鑰回復協定金鑰(kr),而IC卡內只有一把加密金鑰回復協定金鑰(kkr),每批IC卡以卡號對應卡管資料庫;(b)洗卡時卡務管理中心將加密金鑰回復協定金鑰(kkr)與Key Recovery Applet寫到IC卡中,金鑰回復協定金鑰(kr)由金鑰回復中心產生,並用A/B金鑰分持碼單將其寫入HSM,並將金鑰回復協定金鑰(kr)用加密金鑰回復協定金鑰(kkr)加密後,資料送至卡務管理中心存入卡管資料庫;(c)金鑰回復中心之HSM硬體安全模組事先產生加 解密的金鑰以HSM硬體安全模組內部自行產生的金鑰(kh)進行加密,再滙出至金鑰回復中心之硬碟;b. 發卡階段之金鑰備份(a)金鑰回復中心執行HSM與IC卡(Key Recovery Applet)間發卡階段之金鑰備份協定,將先前預先產生的加解密金鑰寫入IC卡內正確的Key container中,之後將使用HSM之內部自行產生的金鑰(kh)加密過的加解密金鑰寫至共用資料庫內;(b)金鑰回復中心將寫好加密金鑰之IC卡回送至卡務管理中心,由卡務管理中心進行憑證之簽發與寫入。 For example, the secure key recovery method described in claim 2, wherein the key backup technology is in the following order: a. issuing the card for pre-operation (a) the HSM and the card management center of the key recovery center have one The same key is returned to the agreement key (kr), and only one encryption key is used to reply the agreement key (kkr) in the IC card, and each batch of IC cards corresponds to the card management database by the card number; (b) the card is washed. The management center writes the encryption key agreement agreement key (kkr) and the Key Recovery Applet to the IC card, and the key reply agreement key (kr) is generated by the key reply center, and uses the A/B key to share the code list. Write it to the HSM, and encrypt the key reply agreement key (kr) with the encryption key reply protocol key (kkr), and send the data to the card management center to store the card management database; (c) the key The HSM hardware security module of the reply center is generated in advance. The decrypted key is encrypted by the self-generated key (kh) of the HSM hardware security module, and then sent out to the hard disk of the key recovery center; b. Key backup during the card issuance stage (a) Key reply center Perform the key backup agreement between the HSM and the Key Recovery Applet (aka Key Recovery Applet), and write the previously generated encryption and decryption key into the correct Key container in the IC card, and then use the internal self-generated key of the HSM. (kh) The encrypted encryption and decryption key is written into the shared database; (b) the key recovery center sends the IC card with the encrypted key back to the card management center, and the card management center issues the certificate and Write. 如申請專利範圍第2項所述之安全的金鑰回復方法,其中金鑰備份與回復之安全通訊協定之演算步驟依序為:a. 使用本身與對方才知道的回復金鑰Kr加密亂數產生的會議金鑰SK,並傳送給HSM硬體安全模組;b. HSM硬體安全模組以回復金鑰Kr解出會議金鑰SK,並以SK加密臨時產生的亂數值(即Nonce)N1,「傳送」給IC卡;c. IC卡以先前產生的SK解密HSM傳來的資訊得到N1,產生另一個臨時使用的亂數值N2,疊接N1與N2,再以SK加密疊接後資料,回送給HSM硬體安全模組;d. HSM硬體安全模組以SK解密,取出N1及N2二個值,比對N1是否與原先所產生的N1相等,若N1不相符則協定中止;反之,若相等則疊接N2與所要傳送的資料EData,再以SK加密疊接後資料傳給IC卡,IC卡以先前產生的SK解密,得到N2與EData,比對N2是否與原先所產生的N2相等, 若N2不相符則協定中止;反之,若相等則可確認EData的來源與正確性,協定運作完成。 For example, in the secure key recovery method described in claim 2, the calculation procedure of the secure communication protocol of the key backup and reply is in order: a. encrypt the random number using the reply key Kr which is known to the other party itself. The generated conference key SK is transmitted to the HSM hardware security module; b. The HSM hardware security module solves the conference key SK by the reply key Kr, and encrypts the temporarily generated random value (ie, Nonce) with SK encryption. N1, "transfer" to the IC card; c. The IC card obtains the N1 information from the previously generated SK decryption HSM, and generates another temporarily used random number N2, splicing N1 and N2, and then splicing with SK encryption. The data is sent back to the HSM hardware security module; d. The HSM hardware security module decrypts with SK, and takes out two values of N1 and N2. The comparison N1 is equal to the original N1. If N1 does not match, the agreement is aborted. On the other hand, if they are equal, the N2 and the data EData to be transmitted are spliced, and then the data is transmitted to the IC card by the SK encryption, and the IC card is decrypted by the previously generated SK to obtain N2 and EData, and whether the N2 is the same as the original one. The resulting N2 is equal, If N2 does not match, the agreement is aborted; otherwise, if they are equal, the source and correctness of EData can be confirmed, and the agreement is completed. 如申請專利範圍第2項所述之安全的金鑰回復方法,其中整個金鑰備份與回復之流程依序為:a. 卡務管理中心(CMC)將加密金鑰回復協定金鑰(kkr)以及Key Recovery Applet寫入IC卡中;b. 金鑰回復中心(KRC)將金鑰回復協定金鑰(kr)用加密金鑰回復協定金鑰(kkr)加密後寫入卡管資料庫;c. 金鑰回復中心(KRC)將金鑰回復協定金鑰(kr)寫入硬體安全模組(HSM)中;d. 硬體安全模組(HSM)以內部自行產生的金鑰(kh)對硬體安全模組(HSM)事先產生加解密的金鑰進行加密;e. 透過金鑰備份與回復之安全通訊協定將硬體安全模組(HSM)事先產生加解密的金鑰(未以kh加密)寫入IC卡中;f. 將硬體安全模組(HSM)事先產生加解密的金鑰(以kh加密)寫入金鑰回復資料庫中;g. 從憑證管理中心儲存庫(Repository)將憑證下載與寫入IC卡中;h. 金鑰回復中心(KRC)從金鑰回復資料庫中讀取硬體安全模組(HSM)事先產生加解密的金鑰(以kh加密);i. 透過金鑰備份與回復之安全通訊協定將硬體安全模組(HSM)事先產生加解密的金鑰(未以kh加密)寫入另一張IC卡中;以及j. 從憑證管理中心儲存庫(Repository)將憑證下載與寫入另一張IC卡,完成金鑰回復。 For example, the secure key reply method described in claim 2, wherein the entire key backup and reply process is in the following order: a. The card management center (CMC) replies the encryption key to the agreement key (kkr) And the Key Recovery Applet is written into the IC card; b. The Key Recovery Center (KRC) encrypts the key reply protocol key (kr) with the encryption key reply protocol key (kkr) and writes it to the card management database; The Key Recovery Center (KRC) writes the key recovery agreement key (kr) into the hardware security module (HSM); d. The hardware security module (HSM) internally generates the key (kh) Secure the encryption and decryption key of the hardware security module (HSM) in advance; e. Securely communicate the key to the hardware security module (HSM) through the secure key agreement of the key backup and reply (not Kh encryption) is written into the IC card; f. The hardware security module (HSM) generates the encryption and decryption key (encrypted in kh) into the key reply database; g. from the credential management center repository ( Repository) downloads and writes the voucher to the IC card; h. Key Recovery Center (KRC) reads the hardware security module (HSM) from the key reply database to generate The decrypted key (encrypted in kh); i. The secure communication protocol for key backup and reply by the key security module (HSM) to generate the encryption and decryption key (not encrypted in kh) to write another IC In the card; and j. Download and write the voucher from the voucher management center repository to another IC card to complete the key reply.
TW99133952A 2010-10-06 2010-10-06 Secure key recovery system and method TWI430643B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW99133952A TWI430643B (en) 2010-10-06 2010-10-06 Secure key recovery system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW99133952A TWI430643B (en) 2010-10-06 2010-10-06 Secure key recovery system and method

Publications (2)

Publication Number Publication Date
TW201216663A TW201216663A (en) 2012-04-16
TWI430643B true TWI430643B (en) 2014-03-11

Family

ID=46787283

Family Applications (1)

Application Number Title Priority Date Filing Date
TW99133952A TWI430643B (en) 2010-10-06 2010-10-06 Secure key recovery system and method

Country Status (1)

Country Link
TW (1) TWI430643B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI606363B (en) * 2016-11-07 2017-11-21 Chunghwa Telecom Co Ltd Key share system and method
TWI669628B (en) * 2018-07-17 2019-08-21 關楗股份有限公司 Token device for conducting cryptography key backup or restoration operation

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI578189B (en) * 2015-04-07 2017-04-11 Chunghwa Telecom Co Ltd A virtual disk management system using a secure encryption device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI606363B (en) * 2016-11-07 2017-11-21 Chunghwa Telecom Co Ltd Key share system and method
TWI669628B (en) * 2018-07-17 2019-08-21 關楗股份有限公司 Token device for conducting cryptography key backup or restoration operation

Also Published As

Publication number Publication date
TW201216663A (en) 2012-04-16

Similar Documents

Publication Publication Date Title
US10439811B2 (en) Method for securing a private key on a mobile device
CN111971929B (en) Secure distributed key management system
CN106548345B (en) Method and system for realizing block chain private key protection based on key partitioning
CN107959567B (en) Data storage method, data acquisition method, device and system
CN106789052B (en) Remote key issuing system based on quantum communication network and use method thereof
TW201733302A (en) Blockchain-based system combined with secure multi-party anti-lost storage and encryption key transfer in wallet management system
CN106330868A (en) Encrypted storage key management system and method of high-speed network
US20220407691A1 (en) Data protection and recovery systems and methods
US8806206B2 (en) Cooperation method and system of hardware secure units, and application device
CN106897879A (en) Block chain encryption method based on the PKI CLC close algorithms of isomerization polymerization label
CN103580855A (en) Usbkey management plan based on sharing technology
CN108537537A (en) A kind of safe and reliable digital cash Wallet System
BE1024812A9 (en) A SECURITY APPROACH FOR THE STORAGE OF CREDENTIALS FOR OFFLINE USE AND AGAINST COPY PROTECTED CLEAN CONTENT IN DEVICES
CN111242611A (en) Method and system for recovering digital wallet key
US12217251B2 (en) System and method for the protection of consumer financial data utilizing dynamic content shredding
CN116232639A (en) Data transmission method, device, computer equipment and storage medium
TWI476629B (en) Data security and security systems and methods
WO2025148510A1 (en) Authentication method based on dual quantum random number protection, client, and system
CN107733936A (en) A kind of encryption method of mobile data
CN116827653B (en) Data encryption and authorization management method based on Hyperledger Fabric alliance chain
TWI430643B (en) Secure key recovery system and method
US10764260B2 (en) Distributed processing of a product on the basis of centrally encrypted stored data
CN116340331A (en) A method and system for depositing certificates of large-scale instrument experiment results based on blockchain
CN103916237A (en) Method and system for managing user encrypted-key retrieval
CN106953917B (en) Method of data synchronization and system

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees