Key processing with control vectors

@article{Matyas1991KeyPW,
  title={Key processing with control vectors},
  author={Stephen M. Matyas},
  journal={Journal of Cryptology},
  year={1991},
  volume={3},
  pages={113-136}
}
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is cryptographically coupled to the key by way of a special encryption process. Each encrypted key and control vector are stored and distributed within the cryptographic system as a single token. Decryption of a key requires respecification… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 15 references

Data Authentication Using Modification Detection Codes Based on a Public One Way Encryption Function, U.S

D. Coppersmith, S. Pilpel, +5 authors M. Schilling
1990

Controlled Use of Cryptographic Keys Via Generating Station Established Control Values, U.S

B. Brachtl, S. M. Matyas, C. H. Meyer
Patent No. 4,850,017 • 1989

Cryptography--A New Dimension in Computer Data

C. H. Meyer, S. M. Matyas
1982

Some techniques for handling encipherment keys, ICL

R. W. Jones
Technical Journal, • 1982

Notarization System for Computer Networks, NBS Special Publication 500-54

M. E. Smid
U.S. Department of Commerce, National Bureau of Standards, • 1979

Protection in Programmed Systems, Ph.D

A. K. Jones
1973

Similar Papers

Loading similar papers…