Cryptographic key management
First Claim
1. A cryptographic key management method for use in a computer system, wherein communications between different locations within the system are protected by cryptographic means employing at least one current key, the method including the steps:
- (a) scheduling the current key to be changed at a scheduled change time;
(b) creating a spare key;
(c) scheduling the spare key to be changed at the same scheduled change time as said current key; and
(d) in the event of the current key being compromised, substituting the spare key for the current key, to allow communications to continue with minimum interruption.
2 Assignments
0 Petitions
Accused Products
Abstract
Business data flows from one computer system (1) to another (2) and its integrity can be protected by cryptographic means, such as digital signatures. In particular, a source system (1) may use a private key (DSPR) to sign outgoing data, and a destination system (2) may use a public key (DSPU) to verify incoming data. For security purposes all keys should be changed at scheduled times calculated using factors including key lifetime (from which is calculated the key expiry time) and key delivery time. If a key is compromised it needs to be changed at other than the scheduled time, and in general this will result in calculation of a new scheduled key change time. If a DSPR key is delivered to the source system (1) encrypted by a key encryption key (KEK), then change to the KEK key will in general also be needed upon compromise of the DSPR key. A new key changetime calculation can be avoided if another public key/private key pair is pre-generated and the public key part pre-supplied to the destination system (2), where it is stored as a spare. When the existing private key (DSPR) is compromised, the new private key corresponding to the spare is supplied to the source system (1) and can be put into use immediately. In this case the expiry time of the spare public key will be substantially the same as that of the original public key, as it will deemed to have been in use as of delivery, and recalculation of the key changetime will not be required. Preferably a public key in use at the destination system (2) is not revoked immediately upon compromise of the corresponding private key, in order to enable messages signed by that private key to be verified at the destination system, using the corresponding public key, during a predetermined time interval (message latency) after signing. A maximum value for the message latency may be set and used as another factor in the scheduled key change time calculation.
39 Citations
8 Claims
-
1. A cryptographic key management method for use in a computer system, wherein communications between different locations within the system are protected by cryptographic means employing at least one current key, the method including the steps:
-
(a) scheduling the current key to be changed at a scheduled change time;
(b) creating a spare key;
(c) scheduling the spare key to be changed at the same scheduled change time as said current key; and
(d) in the event of the current key being compromised, substituting the spare key for the current key, to allow communications to continue with minimum interruption. - View Dependent Claims (2, 3, 4, 5, 6)
(a) determining a key lifetime according to the key type;
(b) calculating a key expiry time by adding said key lifetime to a current time; and
(c) calculating the scheduled change time by subtracting a predetermined time interval from said key expiry time.
-
-
3. A method according to claim 2, wherein said predetermined time interval includes a maximum key generation and delivery time.
-
4. A method according to claim 3, wherein said current key comprises a public key used to verify messages signed by a corresponding private key, and wherein said predetermined time interval further includes a maximum permitted time interval between signing and verification of any of said messages.
-
5. A method according to claim 1, wherein a said current key is delivered under encryption by a key encryption key, wherein a respective scheduled change time is calculated for the current key and for the key encryption key, and including the step of changing the current key whenever the key encryption key is changed, including unscheduled changes thereof.
-
6. A method as claimed in claim 5, including the step of changing the key encryption key whenever the current key undergoes a scheduled change.
-
7. A computer system comprising:
-
(a) cryptographic means employing at least one current key for protecting communications between different locations within the system;
(b) means for scheduling the current key to be changed at a scheduled change time;
(c) means for creating a spare key;
(d) means for scheduling the spare key to be changed at the same scheduled change time as said current key; and
(e) means for substituting the spare key for the current key, in the event of the current key being compromised, to allow communications to continue with minimum interruption. - View Dependent Claims (8)
(a) means for determining a key lifetime according to the key type;
(b) means for calculating a key expiry time by adding said key lifetime to a current time; and
(c) means for calculating the scheduled change time by subtracting a predetermined time interval from said key expiry time.
-
Specification