Method and apparatus for interoperable validation of key recovery information in a cryptographic system
First Claim
1. In a communications system in which a first party transmits encrypted data along with recovery information to a second party who decrypts the encrypted data using a decryption key, said system having one or more key recovery agents for enabling recovery of said decryption key using said recovery information, a method of demonstrating to said second party the ability of said first party to correctly generate said recovery information, comprising the steps of:
- having said first party generate a first key recovery block as a test block containing recovery information for a first decryption key and transmit said first key recovery block to an independent certification authority;
having said independent certification authority validate said recovery information and, upon determining that said recovery information is correctly generated, generate a certificate certifying a public verification key corresponding to a private signature key of said first party;
having said first party generate a second key recovery block containing recovery information for a second decryption key used by said second party to decrypt encrypted data received from said first party; and
having said first party transmit said second key recovery block to said second party along with a digital signature generated on said second key recovery block using said private signature key to allow said second party to verify the ability of said first party to correctly generate the recovery information in said second key recovery block by validating said digital signature using said certificate.
1 Assignment
0 Petitions
Accused Products
Abstract
In a cryptographic communications system, a method and apparatus for allowing a sender of encrypted data to demonstrate to a receiver its ability to correctly generate key recovery information that is transmitted along with the encrypted data and from which law enforcement agents or others may recover the original encryption key. Initially, the sender generates a key pair comprising a private signature key and a corresponding public verification key and sends the latter to a key recovery validation service (KRVS). Upon a satisfactory demonstration by the sender of its ability to correctly generate key recovery information, the KRVS generates a certificate certifying the public verification key and the ability of the sender to correctly generate key recovery information. The sender uses its private signature key to generate a digital signature on the key recovery information, which is sent along with the key recovery information and encrypted data to the receiver. The receiver verifies the signature on the key recovery information using the certified public verification key and decrypts the encrypted data only if the signature is verified as being a valid signature.
151 Citations
22 Claims
-
1. In a communications system in which a first party transmits encrypted data along with recovery information to a second party who decrypts the encrypted data using a decryption key, said system having one or more key recovery agents for enabling recovery of said decryption key using said recovery information, a method of demonstrating to said second party the ability of said first party to correctly generate said recovery information, comprising the steps of:
-
having said first party generate a first key recovery block as a test block containing recovery information for a first decryption key and transmit said first key recovery block to an independent certification authority; having said independent certification authority validate said recovery information and, upon determining that said recovery information is correctly generated, generate a certificate certifying a public verification key corresponding to a private signature key of said first party; having said first party generate a second key recovery block containing recovery information for a second decryption key used by said second party to decrypt encrypted data received from said first party; and having said first party transmit said second key recovery block to said second party along with a digital signature generated on said second key recovery block using said private signature key to allow said second party to verify the ability of said first party to correctly generate the recovery information in said second key recovery block by validating said digital signature using said certificate. - View Dependent Claims (2, 3, 4, 5)
-
-
6. In a communications system in which a first party transmits encrypted data along with recovery information to a second party who decrypts the encrypted data using a decryption key, said system having one or more key recovery agents for enabling recovery of said decryption key using said recovery information, apparatus for demonstrating to said second party the ability of said first party to correctly generate said recovery information, said apparatus comprising:
-
means associated with said first party for generating a first key recovery block as a test block containing recovery information for a first decryption key and for transmitting said first key recovery block to an independent certification authority; means associated with said independent certification authority for validating said recovery information and, upon determining that said recovery information is correctly generated, for generating a certificate certifying a public verification key corresponding to a private signature key of said first party; means associated with said first party for generating a second key recovery block containing recovery information for a second decryption key used by said second party to decrypt encrypted data received from said first party; and means associated with said first party for transmitting said second key recovery block to said second party along with a digital signature generated on said second key recovery block using said private signature key to allow said second party to verify the ability of said first party to correctly generate the recovery information in said second key recovery block by validating said digital signature using said certificate. - View Dependent Claims (7, 8, 9, 10)
-
-
11. In a communications system in which a first party transmits encrypted data along with recovery information to a second party who decrypts the encrypted data using a decryption key, said system having one or more key recovery agents for enabling recovery of said decryption key using said recovery information, a method of demonstrating to said second party the ability of said first party to correctly generate said recovery information, wherein said first party performs the steps of:
-
transmitting a first key recovery block as a test block containing recovery information for a first decryption key to an independent certification authority; receiving a certificate from said independent certification authority certifying a public verification key corresponding to a private signature key upon validation of said recovery information by said independent certification authority; generating a second key recovery block containing recovery information for a second decryption key used by said second part to decrypt encrypted data received from said first party; and transmitting said second key recovery block to said second party along with a digital signature generated on said second key recovery block using said private signature key to allow said second party to verify the ability of said first party to correctly generate the recovery information in said second key recovery block by validating said digital signature using said certificate. - View Dependent Claims (12, 13, 14)
-
-
15. In a communications system in which a first party transmits encrypted data along with recovery information to a second party who decrypts the encrypted data using a decryption key, said system having one or more key recovery agents for enabling recovery of said decryption key using said recovery information, apparatus for demonstrating to said second party the ability of said first party to correctly generate said recovery information, said apparatus being associated with said first party and comprising:
-
means for transmitting a first key recovery block as a test block containing recovery information for a first decryption key to an independent certification authority; means for receiving a certificate from said independent certification authority certifying a public verification key corresponding to a private signature key upon validation of said recovery information by said independent certification authority; means generating a second key recovery block containing recovery information for a second decryption key used by said second part to decrypt encrypted data received from said first party; and means for transmitting said second key recovery block to said second party along with a digital signature generated on said second key recovery block using said private signature key to allow said second party to verify the ability of said first party to correctly generate the recovery information in said second key recovery block by validating said digital signature using said certificate. - View Dependent Claims (16, 17, 18)
-
-
19. A program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform method steps for demonstrating to a second party the ability of said first party to correctly generate said recovery information in a communications system in which said first party transmits encrypted data along with recovery information to said second party who decrypts the encrypted data using a decryption key, said system having one or more key recovery agents for enabling recovery of said decryption key using said recovery information, said method steps being performed by said first party and comprising:
-
transmitting a first key recovery block as a test block containing recovery information for a first decryption key to an independent certification authority; receiving a certificate from said independent certification authority certifying a public verification key corresponding to a private signature key upon validation of said recovery information by said independent certification authority; generating a second key recovery block containing recovery information for a second decryption key used by said second part to decrypt encrypted data received from said first party; and transmitting said second key recovery block to said second party along with a digital signature generated on said second key recovery block using said private signature key to allow said second party to verify the ability of said first party to correctly generate the recovery information in said second key recovery block by validating said digital signature using said certificate. - View Dependent Claims (20, 21, 22)
-
Specification