ENCRYPTION SETUP VERIFICATION
20170272247 · 2017-09-21
Inventors
Cpc classification
H04L63/0428
ELECTRICITY
H04L9/0861
ELECTRICITY
H04L9/0819
ELECTRICITY
H04L9/30
ELECTRICITY
H04L2209/60
ELECTRICITY
H04L9/0877
ELECTRICITY
International classification
H04L9/30
ELECTRICITY
H04L9/32
ELECTRICITY
H04L9/08
ELECTRICITY
G06F21/57
PHYSICS
Abstract
There is provided mechanisms for verifying setup of encryption of a block of data. The method is performed by a client node. A method comprises obtaining an indication to encrypt the block of data. The method comprises providing a first message to a compute node indicating a setup request of a block storage volume, V, to be encrypted, wherein the first message comprises a nonce, N. The method comprises obtaining a second message from the compute node, wherein the second message comprises the nonce, N, and provides validation that a key management node has taken part in setup of the encryption of the block of data and a cryptographic measurement of the compute node, including evidence that the compute node is in a trusted state according to the key management node. There is also provide such a client node. There is further provided a compute node and a method performed by the compute node. There is further provided a key management node and a method performed by the key management node.
Claims
1. A method for verifying setup of encryption of a block of data, the method being performed by a client node, the method comprising: obtaining an indication to encrypt the block of data; providing a first message to a compute node indicating a setup request of a block storage volume, V, to be encrypted, wherein the first message comprises a nonce, N; and obtaining a second message from the compute node, wherein the second message comprises the nonce, N, and provides validation that a key management node has taken part in setup of the encryption of the block of data and a cryptographic measurement of the compute node, including evidence that the compute node is in a trusted state according to the key management node.
2. The method according to claim 1, wherein the first message is digitally signed using a private encryption key of the client node before being provided to the compute node as a digitally signed message M.sup.1.
3. The method according to claim 2, wherein the digitally signed message M.sup.1 is encrypted using a public key of a key management node before being provided to the compute node as an encrypted message M.sup.2.
4. The method according to claim 1, wherein the first message is provided to the compute node as part of a volume attach (VA) message.
5. The method according to claim 1, wherein the second message further comprises a receipt content, R, the receipt content comprising a cryptographic hash of trusted platform configuration register (PCR) content, signed by an Attestation Identity Key (AIK).
6. A method for verifying setup of encryption of a block of data, the method being performed by a compute node, the method comprising: obtaining a first message from a client node, wherein the first message indicates a setup request of a block storage volume, V, to be encrypted, and wherein the first message comprises a nonce, N; providing a third message to a key management node, wherein the third message comprises the nonce, N, a unique data storage identity of the block storage volume, V, to be encrypted, and a unique user identity of the client node; obtaining a fourth message from the key management node, wherein the fourth message comprises the nonce, N, and an encrypted data storage key, U.sup.VX; providing a second message to the client node, wherein the second message comprises the nonce, N, and provides validation that the key management node has taken part in setup of the encryption of the block of data and a cryptographic measurement of the compute node, including evidence that the compute node is in a trusted state according to the key management node.
7. The method according to claim 6, wherein the first message is obtained from the client node as part of a volume attach (VA) message.
8. The method according to claim 6, further comprising: retrieving the block storage volume, V, from a block storage node.
9. The method according to claim 8, further comprising, in a case the first message has not been digitally signed using a private encryption key of the client node and not encrypted using a public key of a key management node: verifying whether the block storage volume, V, has already been encrypted or not.
10. The method according to claim 6, further comprising: verifying, with a platform configuration register (PCR) that a trusted boot of the compute node has been performed.
11. The method according to claim 6, further comprising: generating an encrypted message E.sup.1 of B.sup.X using a public encryption key of the key management node, where B.sup.X=Hash(V.sup.Id|U.sup.Id|PK.sup.Bind|B), where V.sup.Id is a unique identity of the block storage volume, V, where U.sup.Id is the unique identity of the client node, and where PK.sup.Bind is a non-migratable trusted platform module (TPM) based bind key.
12. The method according to claim 11, wherein the first message is obtained as a signed and encrypted message, M.sup.2, the method further comprising: providing a Quote2 request, Q.sup.Req, comprising N.sup.Q=Hash(E.sup.1, PK.sup.Bind, M.sup.2, U.sup.Id, V.sup.Id) to the TPM; and obtaining a response, Q.sup.Resp, to the Quote2 request from the TPM.
13. The method according to claim 12, wherein the third message provided to the key management node comprises Q.sup.Resp, E.sup.1, PK.sup.Bind, U.sup.Id and V.sup.Id.
14. The method according to claim 11, wherein the fourth message comprises an encrypted message E.sup.2 of U.sup.VX, where PK.sup.Bind has been used to encrypt U.sup.VX, and where U.sup.VX=B.sup.X⊕U.sup.V, where ⊕ denotes bit-wise XOR between B.sup.X and U.sup.V, and where U.sup.V is a volume encryption key.
15. The method according to claim 14, further comprising: decrypting the encrypted message E.sup.2 to obtain U.sup.VX; and/or storing the encrypted message E.sup.2 with an index set to Hash(B.sup.X).
16. The method according to claim 15, further comprising: obtaining an encryption key B bound to a trusted platform configuration register (PCR) state of a trusted platform module (TPM); and determining U.sup.V=B.sup.X⊕U.sup.VX, where B.sup.X=Hash(V.sup.Id|U.sup.Id|PK.sup.Bind|B).
17. The method according to claim 6, further comprising: providing a further Quote2 request, Q.sup.Req,2, comprising the nonce, N, to the TPM; and obtaining a further response, Q.sup.Resp,2, to the further Quote2 request from the TPM, wherein the further response, Q.sup.Resp,2, comprises receipt content, R, the receipt content comprising a cryptographic hash of a trusted platform configuration register (PCR) content, and signed by an Attestation Identity Key (AIK).
18. The method according to claim 17, further comprising: initiating encryption of the block storage volume, V, to be encrypted; and providing the receipt content, R, to the block storage volume, V.
19. The method according to claim 18, wherein the second message provided to the client node comprises the receipt content, R.
20. A method for verifying setup of encryption of a block of data, the method being performed by a key management node, the method comprising: obtaining a third message from a compute node, wherein the third message comprises a nonce, N, of a client node, a unique data storage identity of a block storage volume, V, to be encrypted, and a unique user identity of the client node; and providing a fourth message to the compute node, wherein the fourth message comprises the nonce, N, and an encrypted data storage key, U.sup.VX.
21. The method according to claim 20, wherein the third message obtained from the compute node comprises Q.sup.Resp, E.sup.1, PK.sup.Bind, U.sup.Id and V.sup.Id, where Q.sup.Resp is response to a Quote2 request made by the compute node to a trusted platform module (TPM), where E.sup.1 is an encrypted message E.sup.1 of B.sup.X using a public encryption key of the key management node, where B.sup.X=Hash(V.sup.Id|U.sup.Id|PK.sup.Bind|B), where V.sup.Id is a unique identity of the block storage volume, V, where U.sup.Id is a unique user identity, where PK.sup.Bind is a non-migratable TPM based bind key, and where B is an encryption key bound to a trusted platform configuration register (PCR) state of the TPM.
22. The method according to claim 20, wherein the third message comprises an encrypted message M.sup.2 originating from the client node, the method further comprising: verifying Q.sup.Resp by determining N.sup.Q=Hash(E.sup.1, M.sup.2, PK.sup.Bind, U.sup.Id, V.sup.Id) and comparing the result thereof to Q.sup.Resp.
23. The method according to claim 20, wherein the third message comprises an encrypted message M.sup.2 originating from the client node, the method further comprising: verifying, with a user identification node, the encrypted message M.sup.2 using a public encryption key, U.sup.PUB, of the client node.
24. The method according to claim 20, wherein the third message comprises a digitally signed message M.sup.1 originating from the client node, the method further comprising: verifying the digitally signed message M.sup.1.
25. The method according to claim 20, further comprising: generating a root encryption key, U.sup.K, for the client node.
26. The method according to claim 25, further comprising: assigning a volume encryption key, U.sup.V, derived from U.sup.K, such that U.sup.V is re-creatable for the client node when verifying a Q.sup.Resp message and that U.sup.V is unique for the block storage volume, V, to be encrypted.
27. The method according to claim 26, further comprising: determining U.sup.VX=B.sup.X⊕U.sup.V, where ⊕ denotes bit-wise XOR, between B.sup.X and U.sup.V.
28. The method according to claim 27, further comprising: generating an encrypted message E.sup.2 of U.sup.VX using PK.sup.Bind.
29. The method according to claim 28, wherein the fourth message provided to the compute node comprises the encrypted message E.sup.2.
30. A client node for verifying setup of encryption of a block of data, the client node comprising processing circuitry, the processing circuitry being configured to cause the client node to: obtain an indication to encrypt the block of data; provide a first message to a compute node indicating a setup request of a block storage volume, V, to be encrypted, wherein the first message comprises a nonce, N; and obtain a second message from the compute node, wherein the second message comprises the nonce, N, and provides validation that a key management node has taken part in setup of the encryption of the block of data and a cryptographic measurement of the compute node, including evidence that the compute node is in a trusted state according to the key management node.
31. A compute node for verifying setup of encryption of a block of data, the compute node comprising processing circuitry, the processing circuitry being configured to cause the compute node to: obtain a first message from a client node, wherein the first message indicates a setup request of a block storage volume, V, to be encrypted, and wherein the first message comprises a nonce, N; provide a third message to a key management node, wherein the third message comprises the nonce, N, a unique data storage identity of the block storage volume, V, to be encrypted, and a unique user identity of the client node; obtain a fourth message from the key management node, wherein the fourth message comprises the nonce, N, and an encrypted data storage key, U.sup.VX; provide a second message to the client node, wherein the second message comprises the nonce, N, and provides validation that the key management node has taken part in setup of the encryption of the block of data and a cryptographic measurement of the compute node, including evidence that the compute node is in a trusted state according to the key management node.
32. A key management node for verifying setup of encryption of a block of data, the key management node comprising processing circuitry, the processing circuitry being configured to cause the key management node to: obtain a third message from a compute node, wherein the third message comprises a nonce, N, of a client node, a unique data storage identity of a block storage volume, V, to be encrypted, and a unique user identity of the client node; and provide a fourth message to the compute node, wherein the fourth message comprises the nonce, N, and an encrypted data storage key, U.sup.VX.
33. A nontransitory computer readable storage medium comprising a computer program for verifying setup of encryption of a block of data, the computer program comprising computer code which, when run on processing circuitry of a client node, causes the client node to: obtain an indication to encrypt the block of data; provide a first message to a compute node indicating a setup request of a block storage volume, V, to be encrypted, wherein the first message comprises a nonce, N; and obtain a second message from the compute node, wherein the second message comprises the nonce, N, and provides validation that a key management node has taken part in setup of the encryption of the block of data and a cryptographic measurement of the compute node, including evidence that the compute node is in a trusted state according to the key management node.
34. A nontransitory computer readable storage medium comprising a computer program for verifying setup of encryption of a block of data, the computer program comprising computer code which, when run on processing circuitry of a compute node, causes the compute node to: obtain a first message from a client node, wherein the first message indicates a setup request of a block storage volume, V, to be encrypted, and wherein the first message comprises a nonce, N; provide a third message to a key management node, wherein the third message comprises the nonce, N, a unique data storage identity of the block storage volume, V, to be encrypted, and a unique user identity of the client node; obtain a fourth message from the key management node, wherein the fourth message comprises the nonce, N, and an encrypted data storage key, U.sup.VX; provide a second message to the client node, wherein the second message comprises the nonce, N, and provides validation that the key management node has taken part in setup of the encryption of the block of data and a cryptographic measurement of the compute node, including evidence that the compute node is in a trusted state according to the key management node.
35. A nontransitory computer readable storage medium comprising a computer program for verifying setup of encryption of a block of data, the computer program comprising computer code which, when run on processing circuitry of a key management node, causes the key management node to: obtain a third message from a compute node, wherein the third message comprises a nonce, N, of a client node, a unique data storage identity of a block storage volume, V, to be encrypted, and a unique user identity of the client node; and provide a fourth message to the compute node, wherein the fourth message comprises the nonce, N, and an encrypted data storage key, U.sup.VX.
36. (canceled)
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0031] The inventive concept is now described, by way of example, with reference to the accompanying drawings, in which:
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
DETAILED DESCRIPTION
[0042] The inventive concept will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the inventive concept are shown. This inventive concept may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the inventive concept to those skilled in the art. Like numbers refer to like elements throughout the description. Any step or feature illustrated by dashed lines should be regarded as optional.
[0043]
[0044] The client node 200 may be a wireless device, a mobile station, a mobile phone, a handset, a wireless local loop phone, a user equipment (UE), a mobile equipment, a smartphone, a laptop computer, a tablet computer, a wireless modem, or a sensor device. It may also be a more stationary device such as a telematics unit embedded in or attachable to a vehicle, such as a car, truck, bus, boat, train, airplane and flying drone. The client node 200 may also for example be embedded in or attachable to a domestic appliance, such as in white goods, door locks, surveillance and alarm equipment and autonomous vacuum cleaners and grass cutters. The client node 200 may also be embedded in or attachable telematics units for robots and 3D printers used for industrial purposes or for domestic support functions. Other examples of where the client node 200 may be incorporated or added to is in public service equipment, such as street lamps, surveillance cameras, entrance admittance equipment for public transport. The client node 200 may in other words be or be implemented in equipment which is able to utilize the wireless connectivity to the communications network 100. Further examples of such client nodes 200 are equipment used in healthcare and in payment terminals, e.g. payment terminals for credit cards.
[0045] It is assumed that the client node 200 has a need to securely store encrypted data.
[0046] The embodiments disclosed herein therefore relate to mechanisms for verifying setup of encryption of a block of data. In order to obtain such mechanisms there is provided a client node 200, a method performed by the client node 200, a computer program product comprising code, for example in the form of a computer program, that when run on processing circuitry of the client node 200, causes the client node 200 to perform the method. In order to obtain such mechanisms there is further provided a compute node 300, a method performed by the compute node 300, and a computer program product comprising code, for example in the form of a computer program, that when run on processing circuitry of the compute node 300, causes the compute node 300 to perform the method. In order to obtain such mechanisms there is further provided a key management node 400, a method performed by the key management node 400, and a computer program product comprising code, for example in the form of a computer program, that when run on processing circuitry of the key management node 400, causes the key management node 400 to perform the method.
[0047]
[0048]
[0049]
[0050] Reference is now made to
[0051] S202: The client node 200 obtains an indication to encrypt the block of data. Even if encryption of the block of data always is enabled, this in itself defines an indirect indication that the block of data is to he encrypted.
[0052] S204: The client node 200 provides a first message to a compute node 300. The first message indicates a setup request of a block storage 130 volume, V, to be encrypted. The first message comprises a nonce, N. The nonce, N, could be a cryptographic nonce, a timestamp, etc.
[0053] S206: The client node 200 obtains a second message from the compute node 300. The second message comprises the nonce, N, and provides validation that a key management node 400 has taken part in setup of the encryption of the block of data and a cryptographic measurement of the compute node 300, including evidence that the compute node 300 is in a trusted state according to the key management node 400.
[0054] In this respect, the block of data may not necessary be available at the client node 200 when the setup of encryption of the block of data is made, but could, for example, become available once proof of an encrypted block storage volume has been validated (as in step S206). Further, the block storage 130 that is attached to the instance of the client node 200 on the compute node 300 can be used to securely store the block of data onto the encrypted block storage 130. Further, the block of data stored by the instance may not be explicatively available at the client node 200, but rather that the client node 200 indicates the block of data to be protected. Further, the herein disclosed embodiments are not limited to any particular size of the block of data, and neither are the herein disclosed embodiments limited to any particular size of the volume. In this respect, once encrypted, the block storage 130 volume, V, may be defined as an encrypted storage volume for the block of data.
[0055] Reference is now made to
[0056] S302: The compute node 300 obtains a first message from the client node 200. As disclosed above with reference to step S204, the first message indicates a setup request of a block storage 130 volume, V, to be encrypted, and comprises a nonce, N.
[0057] S316: The compute node 300 provides a third message to a key management node 400. The third message comprises the nonce, N, a unique data storage identity of the block storage 130 volume, V, to be encrypted, and a unique user identity of the client node 200.
[0058] S318: The compute node 300 obtains a fourth message from the key management node 400. The fourth message comprises the nonce, N, and an encrypted data storage key, U.sup.VX.
[0059] S336: The compute node 300 provides a second message to the client node 200. As disclosed above with reference to step S206, the second message comprises the nonce, N, and provides validation that the key management node 400 has taken part in setup of the encryption of the block of data and a cryptographic measurement of the compute node 300, including evidence that the compute node 300 is in a trusted state according to the key management node 400.
[0060] Reference is now made to
[0061] S402: The key management node 400 obtains a third message from a compute node 300. As disclosed above with reference to step S316, the third message comprises a nonce, N, of a client node 200, a unique data storage identity of a block storage 130 volume, V, to be encrypted, and a unique user identity of the client node 200.
[0062] S418: The key management node 400 provides a fourth message to the compute node 300. As disclosed above with reference to step S318, the third message comprises the nonce, N, and an encrypted data storage key, U.sup.VX.
[0063] By using RSA encryption keys in arid the TPM on a compute node 300, proof can be provided to the client device 200 that an encrypted block storage 130 volume, V; is setup on a secure compute node 300.
[0064] Proof, in form of signed receipt, is made available to the client device 200 both at the front-end as well as on the encrypted volume itself.
[0065] When attaching an encrypted volume, the key management node 300 can obtain a proof that it is a trusted compute node 300 in an authorized state that requests the volume encryption key of a specific client node 200 for a given volume.
[0066] Storage of secured volume encryption keys in, possibly unsecure, database makes it possible to avoid unnecessary calls to TPM and the key management node 400 in many re-initialization cases.
[0067] An ordinary bind key in combination with NV-RAM data sealed to specific PCR-states and/or protected with a PCR dependent pass-phrase gives the possibility to remotely seal data.
[0068] Embodiments relating to further details of verifying setup of encryption of a block of data as performed by the client node 200, the compute node 300, and the key management node 400 will now be disclosed.
[0069] Reference is now made to
[0070] S100: The client node 200 obtains an indication to encrypt the block of data, as in step S202.
[0071] S101: For an initial volume encryption setup, client node 200 generates nonce N, which is to be used as proof that encryption of the block of data has indeed been setup.
[0072] S102: The client node 200 signs a first message, where the signed first message is denoted M.sup.1, including the nonce. The first message is signed with a private encryption key (such as a private RSA key) of the client node 200. In addition to N, the first message can also include additional information such as a specific platform configuration (PCR) list for a trusted platform module (TPM) quote, and optional a unique volume identity, V.sup.Id. Hence, according to an embodiment the first message is digitally signed using a private encryption key of the client node 200 before being provided to the compute node 300 as a digitally signed message M.sup.1.
[0073] S103: The client node 200 encrypts AP with a public encryption key such as a public RSA key, where RSA is short for Rivest-Shamir-Adleman) of the key management node 400, where the encrypted first message is denoted M.sup.2. Hence, according to an embodiment the digitally signed message M.sup.1 is encrypted using a public key of the key management node 400 before being provided to the compute node 300 as an encrypted message M.sup.2.
[0074] S104: The client node 200 sends M.sup.2 as part of volume attach, VA, to the compute node 300. The compute node 300 thus obtains M.sup.2 from the client node 200. If M.sup.2 is not included in the attach message then this indicates that volume encryption already may have been setup and the client node 200 does not request any proof, alternatively volume encryption is not used for the specific volume. The message M.sup.2 can be mandatory for a new block of data to be encrypted, i.e. where encryption has not yet been setup. Hence, according to an embodiment the first message is provided to the compute node (300) as part of a volume attach, VA, message. Step S104 may be performed as part of above disclosed step S204. Step S104 may be performed as part of above disclosed step S302.
[0075] S105: The compute node 300 checks the VA and may find M.sup.2, indicating a setup request of an encrypted block storage 130 volume, V.
[0076] S106: The compute node 300 retrieves the block storage 130 volume, V, from a block storage node. Hence, according to an embodiment the compute node 300, in a step S106a, retrieves the block storage 130 volume, V, from a block storage node. In case M.sup.2 was not included in the VA message then the block storage 130 volume, V, will be checked if it already is encrypted. Hence, according to an embodiment the compute node 300, in a step S106b, and in a case the first message has not been digitally signed using a private encryption key of the client node 200 and not encrypted using a public key of a key management node 400, verifies whether the block storage 130 volume, V, has already been encrypted or riot.
[0077] S107: Prior continuing with volume encryption, the compute node 300 checks its TPM PCR register(s) to ensure that trusted boot has been performed. Hence, according to an embodiment the compute node 300, in a step S308, verifies with the PCR that a trusted boot of the compute node 300 has been performed.
[0078] S108: If not already available, the compute node 300 creates a non migratable TPM based bind key, which public part is denoted PK.sup.Bind, as well as associated certification information. An encryption key, B, is read from TPM Non-Volatile Random Access Memory (NV-RAM), which is bound to a trusted PCR state of the TPM. The encryption key B is created, such as with a random value, at trusted boot if not already existing. The trusted state may include a passphrase that is used to extend a PCR register prior defining the NV-RAM space. An alternative to using the encryption key, B, for PCR-dependency is to let PK.sup.Bind be dependent on the trusted PCR state.
[0079] S109: The compute node 300 creates B.sup.X=Hash(V.sup.Id|U.sup.Id|PK.sup.Bind|B), where Hash(x) is a hash function of the parameter x. In turn, B.sup.X will be encrypted, E(B.sup.X), where the encrypted message is denoted E.sup.1, with the public encryption key of the key management node 400. Hence, according to an embodiment the compute node 300, in a step S310, generates an encrypted message E.sup.1 of B.sup.X using a public encryption key of the key management node 400, where B.sup.X=Hash(V.sup.Id|U.sup.Id|PK.sup.Bind|B), where V.sup.Id is a unique identity of the block storage 130 volume, V, where U.sup.Id is the unique identity of the client node 300, where PK.sup.Bind is a non-migratable TPM based bind key.
[0080] S110a, S110b: The compute node 300 makes a Quote2 request. This can be required to provide proof to the key management node 400 that a trusted compute node 300, in an approved PCR state, is requesting the volume encryption key, U.sup.V, of the client node 200. The Quote2 request can make use of N.sup.Q=Hash(E.sup.1, PK.sup.Bind, M.sup.2 (if existing), U.sup.Id and V.sup.Id). Denote the quote response Q.sup.Resp. If M.sup.2 is included in the VA, then a second quote request will be made at a later stage in order to provide proof to the client node 200 that an encrypted volume has been initiated. The Quote2 in Step S110a, S110b can be replaced by a CertifyKey command, generating a Certify-KeyInfo certification of PK.sup.Bind and using Hash(E.sup.1, M.sup.2 (if existing), U.sup.Id and V.sup.Id) as nonce. Hence, according to an embodiment, where the first message is Obtained as a signed and encrypted message, M.sup.2, the compute node 300, in a step S312, provides a Quote2 request, Q.sup.Req, comprising N.sup.Q=Hash(E.sup.1, PK.sup.Bind, M.sup.2, U.sup.Id, V.sup.Id) to the TPM 120; and in return, in a step S314, obtains a response, Q.sup.Resp, to the Quote2 request from the TPM 120.
[0081] S111: The compute node 300 sends Q.sup.Resp, E.sup.1, PK.sup.Bind, U.sup.Id and V.sup.Id and, in the initial case, M.sup.2 to the key management node 400, which thus obtains this information. Hence, according to an embodiment the third message provided to the key management node 400 comprises Q.sub.Resp, E.sup.1, PK.sup.Bind, U.sup.Id and V.sup.Id (and, optionally, M.sup.2). Step S111 may be performed as part of above disclosed step S316. Step S111 maybe performed as part of above disclosed step S402.
[0082] S112: The key management node 400 will, when existing, decrypt M.sup.2 in order to obtain the nonce, N. The key management node 400 will also verify Q.sup.Resp to ensure that a trusted compute node 300 is requesting U.sup.V. When verifying Q.sup.Resp, the key management node 400 will validate N.sup.Q by determining the same hash, i.e., Hash(E.sup.1, PK.sup.Bind, M.sup.2 (if existing), U.sup.Id and V.sup.Id,), and compare the result to Q.sup.Resp. The key management node 400 can now compare the hash of the PCR contents from Q.sup.Resp with a white list to make sure that U.sup.V is only distributed to an approved and trusted compute node 300. Validation of N.sup.Q will also bind the received E.sup.1, PK.sup.Bind, M.sup.2 (if existing), U.sup.Id and V.sup.Id to the platform state proofed by Q.sup.Resp. Hence, according to an embodiment, and where the third message comprises an encrypted message M.sup.2 originating from the client node 200, the key management node 400 is configured to, in a step S404, verify Q.sup.Resp, by determining N.sup.Q=Hash(E.sup.1, M.sup.2, PK.sup.Bind, U.sup.Id, V.sup.Id) and comparing the result thereof to Q.sup.Resp.
[0083] S113: The key management node 400, if M.sup.2 was included, retrieves the public encryption key, denoted U.sup.PUB, of the client node 200 is retrieved from the user identification node 140 to verify M.sup.1. Hence, according to an embodiment, and where the third message comprises an encrypted message M.sup.2 originating from the client node 200, the key management node 400 is configured to, in a step S406, verify with a user identification node 140, the encrypted message M.sup.2 using a public encryption key, U.sup.PUB, of the client node 200.
[0084] S114: The key management node 400, where applicable, verifies the signature of M.sup.1. If V.sup.Id was included in M.sup.2, the key management node 400 also compares V.sup.Id with V.sup.Id as sent from the client node 300 in step S111. Hence, according to an embodiment, and where the third message comprises a digitally signed message M.sup.1 originating from the client node 200, the key management node 400 is configured to, in a step S408, verify the digitally signed message M.sup.1.
[0085] S115: If not existing, the key management node 400 will create a unique user encryption key, denoted U.sup.K, which will be a root key for the client node 200, used to derive other encryption keys. Hence, according to an embodiment the key management node 400 is configured to, in a step S410, generate a root encryption key, U.sup.K, for the client node 200.
[0086] S116: The key management node 400 assigns a specific volume encryption key, denoted U.sup.V, derived from U.sup.K and, in relevant cases, V.sup.Id. U.sup.V is derived such that it later can be recreated for the client ode 200 when verifying a Q.sup.Resp message and that it is unique for the volume. Hence, according to an embodiment the key management node 400 is configured to, in a step S412, assign a volume encryption key, U.sup.V, derived from U.sup.K, such that U.sup.V is re-creatable for the client node (200) when verifying a Q.sup.Resp message and that U.sup.V is unique for the block storage 130 volume, V, to be encrypted.
[0087] S117: The key management node 400 decrypts E.sup.1, obtains B.sup.X and determines U.sup.VX=B.sup.X ⊕ U.sup.V, where ⊕ denotes bit-wise XOR. Hence, according to an embodiment the key management node 400 is configured to, in a step S414, determine U.sup.VX=B.sup.X⊕U.sup.V between B.sup.X and U.sup.V.
[0088] S118: The key management node 400 uses PK.sup.Bind to encrypt U.sup.VX, in relevant cases V.sup.Id, U.sup.Id and optional N when M.sup.2 was included, encrypted message E(U.sup.VX, V.sup.Id, U.sup.Id, N), denoted E.sup.2. Hence, according to an embodiment the key management node 400 is configured to, in a step S416, generate an encrypted message E.sup.2 of U.sup.VX using PK.sup.Bind.
[0089] S119: The key management node 400 provides E.sup.2 to the compute node 300. Hence, according to an embodiment the fourth message provided to the compute node 300 comprises the encrypted message E.sup.2, of U.sup.VX, where PK.sup.Bind has been used to encrypt U.sup.VX, and where U.sup.VX=B.sup.X⊕U.sup.V, where ⊕ denotes bit-wise XOR (i.e., exclusive disjunction, or exclusive or) between B.sup.X and U.sup.V, and where U.sup.V is a volume encryption key. Step S119 may be performed as part of above disclosed step S318. Step S119 may be performed as part of above disclosed step S418.
[0090] S120a, S120b: The compute node 300 unbinds E.sup.2 in the TPM and obtains U.sup.VX, and in relevant cases V.sup.Id, U.sup.Id, and optional the nonce N. If available in a database, then steps S110-S119 need not to be performed as long as the same compute node 300 is used and no update of boot software reflected in above used trust bounded PCR-registers or re-initialization of encryption keys has been performed on the compute node 300. Also, since, in relevant cases V.sup.Id and U.sup.Id are included in E.sup.2, a sanity check can be made when E.sup.2 is read from the database to match it to a client node 200 and, in relevant cases, volume. In the case where the same encryption key is re-used for different volumes for the same client node 200, this encryption key also be picked from the database directly, if existing and up to date, thus without any of steps S110-S119 being performed. An alternative mechanism to securely store U.sup.V locally is be to use TPM seal. Hence, according to an embodiment the compute node 300 is configured to, in a step S320, decrypt the encrypted message E.sup.2 to obtain U.sup.VX. E.sup.2 maybe stored in a database for future use, with an index derived as Hash(B.sup.X). Hence, according to an embodiment the compute node 300 is configured to, in a step S322, store the encrypted message E.sup.2 with an index set to Hash(B.sup.X).
[0091] S121: The compute node 300 uses B, read from TPM NV-RAM, to calculate B.sup.X=Hash(V.sup.Id|U.sup.Id|PK.sup.Bind|B) and can then calculate U.sup.V=B.sup.X ⊕ U.sup.VX. Hence, according to an embodiment the compute node 300 is configured to, in a step S324, obtain an encryption key B bound to a trusted PCR state of the TPM 120; and, in a step S326, determine U.sup.V=B.sup.X ⊕U.sup.VX, where B.sup.X=Hash(V.sup.Id|U.sup.Id|PK.sup.Bind|B).
[0092] S122a, S122b: The compute node 300, in case of an initial volume encryption setup, makes a second TPM quote request, using N as nonce, to the TPM and receives a response comprising a hash of selected PCR contents, Common Alerting Protocol (CAP) version information (optionally), and an Attestation Identity Key (AIK) signature, which covers the data received in the response, as well as the nonce N. Hence, according to an embodiment the compute node 300 is configured to, in a step S328, provide a further Quote2 request, Q.sup.Req,2, comprising the nonce, N, to the TPM 120; and, in a step S330, obtain a further response, Q.sup.Resp2, to the further Quote2 request from the TPM 120, wherein the further response, Q.sup.Resp,2, comprises receipt content, R, the receipt content comprising a cryptographic hash of a trusted PCR content, and signed by the AIK.
[0093] S123a, S123b: The compute node 300 initiates encrypted volume, using U.sup.V, and writes the receipt contents, denoted R, onto the volume. The receipt contents, R, can also be provided to the client node 200. The receipt contents R can comprise the nonce, N, a hash of selected PCR contents, CAP version information (optionally), AIK signature, AIK public encryption key and an AIK public encryption key certificate. Hence, according to an embodiment the compute node 300 is configured to, in a step S332, initiate encryption of the block storage 130 volume, V, to be encrypted; and, in a step S334, provide the receipt content, R, to the block storage 130 volume, V.
[0094] S124: With R written on the block storage 130 volume, V, it can be possible for the running instance on the compute node 300, when the block storage 130 volume, V, has been attach to it, to read and validate the contents R. This provides proof that a setup of an encrypted volume has been initiated and that the setup is performed on a trusted compute node 300, in a state approved by the key management node 400. With N, the client node 200 can verify that the key management node 400 has been used. Inclusion of the nonce, N, blocks a replay attack. The receipt contents, R, with its PCR contents, provides the client device 200 means for verifying the boot state of the compute node 300 and the values can be compared with a white list. Hence, according to an embodiment the second message further comprises a receipt content, R, the receipt content comprising a cryptographic hash of trusted PCR content, signed by an Step S124 may be performed as part of above disclosed step S206. Step S124 may be performed as part of above disclosed step S336.
[0095]
[0096] Particularly, the processing circuitry 210 is configured to cause the client node 200 to perform a set of operations, or steps, S100, S104, S124, S202, S204, S206, as disclosed above. For example, the storage medium 230 may store the set of operations, and the processing circuitry 210 may be configured to retrieve the set of operations from the storage medium 230 to cause the client node 200 to perform the set of operations. The set of operations may be provided as a set of executable instructions. Thus the processing circuitry 210 is thereby arranged to execute methods as herein disclosed.
[0097] The storage medium 230 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, solid state memory or even remotely mounted memory.
[0098] The client node 200 may further comprise a communications interface 220 for communications with at least the compute node 300. As such the communications interface 220 may comprise one or more transmitters and receivers, comprising analogue and digital components.
[0099] The processing circuitry 210 controls the general operation of the client node 200 e.g. by sending data and control signals to the communications interface 220 arid the storage medium 230, by receiving data and reports from the communications interface 220, and by retrieving data and instructions from the storage medium 230. Other components, as well as the related functionality, of the client node 200 are omitted in order not to obscure the concepts presented herein.
[0100]
[0101]
[0102] Particularly, the processing circuitry 310 is configured to cause the compute node 300 to perform a set of operations, or steps, S104, S106a, S106b, S107, S109, S110a, S110b, S111, S119, S120a, S120b, S121a, S121b, S122a, S122b, S123a, 123b, S124, S302-S336, as disclosed above. For example, the storage medium 330 may store the set of operations, and the processing circuitry 310 may be configured to retrieve the set of operations from the storage medium 330 to cause the compute node 300 to perform the set of operations. The set of operations may be provided as a set of executable instructions. Thus the processing circuitry 310 is thereby arranged to execute methods as herein disclosed.
[0103] The storage medium 330 may also comprise persistent storage, which, for example, can he any single one or combination of magnetic memory, optical memory, solid state memory or even remotely mounted memory.
[0104] The compute node 300 may further comprise a communications interface 320 for communications at least with the client node 200 and the key management node 400. As such the communications interface 320 may comprise one or more transmitters and receivers, comprising analogue and digital components.
[0105] The processing circuitry 310 controls the general operation of the compute node 300 e.g. by sending data and control signals to the communications interface 320 and the storage medium 330, by receiving data and reports from the communications interface 320, and by retrieving data and instructions from the storage medium 330. Other components, as well as the related functionality, of the compute node 300 are omitted in order not to obscure the concepts presented herein.
[0106]
[0107]
[0108] Particularly, the processing circuitry 410 is configured to cause the key management node 400 to perform a set of operations, or steps, S111-S119, S402-S418, as disclosed above. For example, the storage medium 430 may store the set of operations, and the processing circuitry 410 may be configured to retrieve the set of operations from the storage medium 430 to cause the key management node 400 to perform the set of operations. The set of operations may be provided as a set of executable instructions. Thus the processing circuitry 410 is thereby arranged to execute methods as herein disclosed.
[0109] The storage medium 430 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, solid state memory or even remotely mounted memory.
[0110] The key management node 400 may further comprise a communications interface 320 for communications at least with the compute node 300 and the user identification node 140. As such the communications interface 320 may comprise one or more transmitters and receivers, comprising analogue and digital components.
[0111] The processing circuitry 410 controls the general operation of the key management node 400 e.g. by sending data and control signals to the communications interface 320 and the storage medium 430, by receiving data and reports from the communications interface 420, and by retrieving data and instructions from the storage medium 430. Other components, as well as the related functionality, of the key management node 400 are omitted in order not to obscure the concepts presented herein.
[0112]
[0113]
[0114] In the example of
[0115] The inventive concept has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the inventive concept, as defined by the appended patent claims.