Cryptographic key management scheme
First Claim
Patent Images
1. A method of managing the use of keys in a cryptographic co-processor, which comprises the steps of:
- selecting a key from one of a symmetrical key type and an asymmetrical key type;
selecting a bit length from the selected key;
generating the key; and
representing the key in one of an external form and an internal form.
4 Assignments
0 Petitions
Accused Products
Abstract
A key management scheme for managing encryption keys in a cryptographic co-processor includes the first step of selecting a key from one of a symmetrical key type and an asymmetrical key type. Then, the key bit length is selected. The key is then generated and, lastly, the key is represented in either an external form or an internal form.
116 Citations
1 Claim
-
1. A method of managing the use of keys in a cryptographic co-processor, which comprises the steps of:
-
selecting a key from one of a symmetrical key type and an asymmetrical key type;
selecting a bit length from the selected key;
generating the key; and
representing the key in one of an external form and an internal form.
-
Specification