Universal secure messaging for cryptographic modules
10554393 ยท 2020-02-04
Assignee
Inventors
Cpc classification
H04L63/045
ELECTRICITY
H04L63/0421
ELECTRICITY
H04L9/0844
ELECTRICITY
H04L2209/56
ELECTRICITY
H04L9/0825
ELECTRICITY
H04L63/0853
ELECTRICITY
International classification
Abstract
An anonymous secure messaging method and system for securely exchanging information between a host computer system and a functionally connected cryptographic module. The invention comprises a Host Security Manager application in processing communications with a security executive program installed inside the cryptographic module. An SSL-like communications pathway is established between the host computer system and the cryptographic module. The initial session keys are generated by the host and securely exchanged using a PKI key pair associated with the cryptographic module. The secure communications pathway allows presentation of critical security parameter (CSP) without clear text disclosure of the CSP and further allows use of the generated session keys as temporary substitutes of the CSP for the session in which the session keys were created.
Claims
1. A secure messaging method for securely exchanging information during a session between a host computer system and a functionally connected cryptographic module, the cryptographic module comprising one or more critical security parameter (CSP) protected applications each requiring a corresponding critical security parameter in order to access the CSP protected application, the method comprising: generating a pair of identical session keys for the session; performing a secure key exchange between the host computer system and the cryptographic module using a public key from a digital certificate associated with the cryptographic module for encrypting information used with the secure key exchange, the host computer system and the cryptographic module each provided with one session key of said pair of identical session keys; generating a unique session identifier at the cryptographic module for the session; associating the unique session identifier with the session key at the cryptographic module; associating the unique session identifier with a critical security parameter, the critical security parameter provided to the host computer system by a user requesting access to the one or more CSP protected applications, the critical security parameter provided by the host computer system to the cryptographic module for initial authentication; determining availability of the critical security parameter to exchange at least a portion of information between the host computer system and the cryptographic module; using the unique session identifier to select the associated session key; performing one or more counterpart cryptographic functions on at least a portion of information exchanged between the host computer system and the cryptographic module during the session using the selected session key as a surrogate for the critical security parameter in response to the critical security parameter not being available; and granting permission to access one or more of the CSP protected applications requiring the critical security parameter for a duration of the session using the session key.
2. The method according to claim 1, wherein the unique session identifier is further associated with a specific function performed by the cryptographic module.
3. The method according to claim 1, wherein the one or more counterpart cryptographic functions include symmetric encryption, decryption, and message authentication.
4. The method according to claim 1, wherein the exchanged information includes the critical security parameter.
5. The method according to claim 1 wherein the session keys are temporarily surrogates for the critical security parameter after successful initial authentication.
6. The method according to claim 1, wherein the exchanged information includes commands sent from at least the host computer system to the cryptographic module.
7. The method according to claim 1, wherein the unique session identifier is generated independently from the identical session keys.
8. The method according to claim 1, further comprising: providing a table that defines a relationship between one or more unique session identifiers, including the unique session identifier, and one more critical security parameters, including the critical service parameter, wherein the table associates the unique session identifier with the critical security parameter.
9. A method of securely exchanging information during a session between a host computer system and a cryptographic module for which a unique session identifier and a session key for the session have been established between the host computer and the cryptographic module, the method comprising: associating the unique session identifier with the at least one session key; associating the unique session identifier with a critical security parameter, the critical security parameter provided by a user to the host computer system and by the host computer system to the cryptographic module for initial authentication; after initial authentication of the critical security parameter, determining availability of the critical security parameter to exchange at least a portion of information between the host computer system and the cryptographic module; and using the at least one session key as a substitute for the critical security parameter during the session to exchange at least a portion of information between the host computer system and the cryptographic module in response to the critical security parameter not being available, wherein the unique session identifier is used to select the associated session key for use as the substitute; wherein using the at least one session key as the substitute includes granting permission to unlock one or more applications authorized for the critical security parameter for a duration of the session using the at least one session key.
10. The method according to claim 9, further comprising: securely exchanging the session key between the host computer system and the cryptographic module using public key encryption.
11. The method according to claim 10, wherein the secure exchanging includes using a public key from a digital certificate associated with the cryptographic module for encrypting information.
12. The method according to claim 9, wherein the exchange of at least a portion of information is performed as part of performing a function, and wherein the method further comprises, performing the initial authentication using the critical security parameter.
13. The method according to claim 9, wherein the unique session identifier is generated independently from the session key.
14. The method according to claim 9, further comprising: providing a table that defines a relationship between one or more unique session identifiers, including the unique session identifier, and one more critical security parameters, including the critical service parameter, wherein the table associates the unique session identifier with the critical security parameter.
Description
BRIEF DESCRIPTION OF DRAWINGS
(1) The features and advantages of the invention will become apparent from the following detailed description when considered in conjunction with the accompanying drawings. Where possible, the same reference numerals and characters are used to denote like features, elements, components or portions of the invention. It is intended that changes and modifications can be made to the described embodiment without departing from the true scope and spirit of the subject invention as defined in the claims.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
DETAILED DESCRIPTION
(15) This present invention provides an anonymous secure messaging arrangement which allows transfer of critical security parameters and other information exchanged between a host computer system and a functionally connected cryptographic module. In addition, the secure messaging arrangement provides a session based temporary surrogate CSP following initial presentation and verification of a CSP to the cryptographic module. The applications are envisioned to be programmed in a high level language using such as Java, C++, C or Visual Basic.
(16) Referring to
(17) A communications interface 55 subsystem is coupled to a network interface 60 and a network 65, a cryptographic module interface 70 and a cryptographic module 75, a user input interface 80 including a mouse and a keyboard 85, a biometric scanner interface 90 and a biometric scanner 95.
(18) The processor 5, main memory 10, display interface 15 secondary memory subsystem 25 and communications interface system 55 are electrically coupled to a communications infrastructure 100. The host computer system includes an operating system, a Host Security Manager application, other applications software, cryptography software capable of performing symmetric and asymmetric cryptographic functions, secure messaging software and device interface software.
(19) The cryptographic module 75 includes a wireless, optical and/or electrical connection means compatible with the cryptographic module interface 70, a processor, volatile and non-volatile memory electrically coupled to the processor, a runtime operating environment, cryptography extensions incorporated into the operating system and capable of performing symmetric and asymmetric cryptographic functions compatible with the host cryptography software, a Security Executive application, one or more CSP protected applications functionally coupled to the Security Executive application and a public key infrastructure (PKI) key pair functionally coupled to the Security Executive application.
(20) The non-volatile memory has operatively stored therein one or more reference CSPs which are verified by the Security Executive application to allow access to the one or more CSP protected applications.
(21) Referring to
(22) The Host Security Manager application 110 includes the ability to perform cryptographic functions available through the cryptography software and extensions, including generation of one or more session based symmetric key pairs for use as block cipher keys during information exchange over the communications link 101.
(23) The Host Security Manager application 110 may exist as a single application or a plurality of interrelated applications and library extensions. The session keys may be used as temporary CSP surrogates which allows access to security functions initially authenticated with the required CSP. The Host Security Manager application 110 further includes the ability to uniquely associate each of the generated symmetric keys with a particular CSP and a CSP protected application installed in the cryptographic module 75. In one embodiment of the invention, access requirements are determined by security policies maintained within the cryptographic module as is described in co-pending U.S. patent application Ser. No. 10/321,624 to Eric Le Saint & al. filed on Dec. 18, 2002, entitled Uniform Framework for Security Tokens, and herein incorporated by reference.
(24) Additional security policies may be combined with the security policies established for the cryptographic module as is described in co-pending US patent application to Eric Le Saint & al. filed the same day as this application, entitled Uniform Framework For Host Computer System, and herein incorporated by reference. In general, the relevant portions of the security policies are comprised of access control rules having a general form shown as an example in Table 1 below;
(25) TABLE-US-00001 TABLE 1 Rule ID Rule State Session ID ACR1 AM1[PIN] + SM 0/1 SID01 ACR2 AM2[BIO] + SM 0/1 SID02 ACR3 AM1[PIN] + AM[BIO] + SM 0/1 SID03
(26) Where;
(27) ACR# refers to an access control rule; AM# refers to an authentication application installed inside the cryptographic module; PIN refers to a CSP in the form of a personal identification number required by the authentication application; BIO refers to a CSP in the form a biometric sample required by the authentication application; and SM refers to a secure messaging application.
(28) The state of each executed access control rule is maintained in a session table and is shown as a binary flag. The session ID is used to determine which session key is assigned the surrogate privileges provided by the PIN and BIO CSPs. In an alternate embodiment of the invention, the Host Security Manager application 110 maintains an equivalent table
(29) The generated session keys are temporarily stored in main memory 10 (
(30) The Security Executive application 115 installed inside the cryptographic module 75 includes the ability to perform the cryptographic functions available from cryptography applications and extensions including; authenticating a received CSP against the stored CSPs and the ability to allow one or more session keys to operate as a temporary surrogate(s) for the reference CSP(s) for gaining access to the one or more CSP protected applications 130 after initial authentication with the actual CSP(s). The temporary surrogate(s) are stored in the volatile memory by the Security Executive application.
(31) The Security Executive application 115 may exist as a single application or a plurality of interrelated applications and library extensions. The received CSP includes a personal identification number (PIN), biometric sample, password, phase phrase, cryptographic key or any combination thereof as described in FIPS Pub 140-2, Security Requirements For Cryptographic Modules, included as a reference to this disclosure.
(32) The Security Executive application 115 controls access to one or more applications 130 by requiring a secure messaging session be established using a secure messaging application SMA 120 and entity authentication using a personal identification number (PIN) PIN 125 or a biometric sample BIO 140. A PKI infrastructure key pair Kpub.sub.t 160 and Kpri.sub.t 165 is provided to perform secure session key exchanges between the host computer system 105 and cryptographic module 75. The public key Kpub.sub.t 160 is not required to be retained inside the cryptographic module 75. The public key 160, may be freely distributed using a digital certificate or other mechanism.
(33) Referring to
(34) Referring to
(35) When transferred from the cryptographic module 75, the Security Executive application 115 routes the public key Kpub.sub.t 160 over the communications link 101 for use by the Host Security Manager application 110. The public key Kpub.sub.t 160 will be used to perform secure session key exchanges between the host computer system 105 and cryptographic module 75.
(36) Referring to
(37) Referring to
(38) Referring to
(39) The Host Security Manager Application 110 generates a MAC 225 of the received session identifier SID[x] 215 and compares it to the received MAC 225. If the generated MAC 225 matches the received MAC 225, the unique session identifier is associated with the counterpart session key KsysSID[x] 220 by the Host Security Manager application 110. The MAC binds the authenticated entity to the particular session key pair and session.
(40) The message authentication code utilizes a keyed message digest algorithm such as DES-based X9.9 or preferably a MAC which utilizes a more robust encryption algorithm and greater bit strength such as AES. When used with ISO 7816 compliant to cryptographic devices, the entire command APDU may be encrypted and MACed using the session key KsysSID[x] 220. In an alternate embodiment of the invention, a separate set of symmetric keys are generated for use with the keyed message authentication code algorithms. For simplicity, the second set of MAC session keys is not shown but operates equivalently to the described implementations of the session keys.
(41) Referring to
(42) Upon receipt of the of the encrypted CSP (PIN).sub.KsysSID[x] 235, the Security Executive application 115 routes the encrypted CSP 235 to the secure messaging application SMA 120 for decryption using the counterpart session key KsysSID[x] 220. A MAC 240 is generated from the decrypted CSP PIN 230 and compared to the MAC 240 sent from the host computer system 105. If the generated MAC 240 matches the received MAC 240, the decrypted PIN 230 is sent to the PIN application PIN 125 for authentication.
(43) If the received PIN 230 matches the stored reference PIN (not shown), the sending entity is authenticated and the session key KsysSID[x] 220 is established as a surrogate of the PIN 230 for the duration of the session by the Security Executive application 115. The duration of the session may be controlled by events initiated by the authenticated entity or user, such as disconnection of the cryptographic module from its interface with the host, logout from the host or may be time dependent such as exceeding a predetermined session length or extended idle period may terminate the session.
(44) Referring to
(45) In this embodiment of the invention, a critical security parameter (CSP) in the form a biometric sample BIO 245 is routed to the Host Security Manager application 110 for secure transport to the cryptographic module 75 using the communications link 101. The secure transport of the CSP involves generating a keyed message authentication code (MAC) of at least the CSP, encryption of at least the CSP using another session key KsysSID[n] 250 generated as described in the discussion for
(46) The encrypted CSP (BIO).sub.KsysSID[n] 255 and MAC 260 are then sent to the Security Executive application 115 installed inside the cryptographic module 75. Upon receipt of the of the encrypted CSP (BIO).sub.KsysSID[n] 255, the Security Executive application 115 routes the encrypted CSP (BIO).sub.KsysSID[n] 255 to the secure messaging application SMA 120 as before for decryption using the counterpart session key KsysSID[n] 250. Another MAC 260 is generated from the decrypted CSP BIO 245 and compared to the MAC 260 sent from the host computer system 105. If the generated MAC 260 matches the received MAC 260, the decrypted BIO 245 is sent to the biometric application BIO 140 for authentication.
(47) If the received biometric sample 245 matches the stored reference biometric template (not shown), the sending entity is authenticated and the session key KsysSID[n] 250 is established as a surrogate of the biometric sample BIO 245 for the duration of the session by the Security Executive application 115. As before, the duration of the session may be controlled by events initiated by the authenticated entity or user, such as disconnection of the cryptographic module from its interface with the host, logout from the host or may be time dependent such as exceeding a predetermined session length or extended idle period may terminate the session.
(48) In
(49) If no available idle session is available 304, a session key pair is generated or derived from a random number each having a bit strength of at least 64 bits 312. In another embodiment of the invention two key pair sets are generated. One key pair set is used for bulk cryptography and the other for use in generating keyed message authentication codes. If not already present on the host computer system, a public key associated with the cryptographic module is retrieved from either the cryptographic module or from a central authority such as a certificate authority 316.
(50) A Host Security Manager application causes one of the generated session keys to be encrypted 320 with the retrieved public key and sent to the cryptographic module. The session key is received by a Security Executive application and caused to be decrypted using an internal private key counterpart to the encrypting public key as part of a secure key exchange 324. The Security Executive application then generates a unique session identifier for the session key pair 328.
(51) The unique session identifier is then associated with the session key pair by the Host Security Manager and Security Executive applications 332. Once the session key pair is associated with the unique session identifier, performance of counterpart cryptographic functions is performed between the host computer system and cryptographic module 344 until the session ends 356, another session needs to be reactivated 304 or a new session needs to be established 312. The details of performing the counterpart cryptographic functions 342 is described in the discussion provided for
(52) Referring to
(53) The Security Executive application retrieves its counterpart session key associated with the received unique session identifier 362 and a mutual authentication session is performed 366 as is described in the discussion provided for
(54) Referring to
(55) The Security Executive application causes the encrypted host random number to be decrypted using the retrieved session key 378 and causes a cryptographic module random number to be generated 380.
(56) The host and cryptographic module random numbers are then encrypted with the retrieved cryptographic module session key 382 and the resulting cryptogram sent to Host Security Manager application installed inside the host computer system.
(57) The Host Security Manager application causes the encrypted host and cryptographic module random numbers to be decrypted using the retrieved host session key 386. The Host Security Manager application causes the decrypted host random number to be verified against the original random number 388. If no match is found 390, processing ends 352, 356 as is shown in
(58) The Security Executive application causes the decrypted cryptographic random number to be verified against the original random number 394. If no match is found 396, processing ends 352, 356 as is shown in
(59) Lastly, referring to
(60) The cryptogram is received by the Security Executive application which causes the cryptogram to be decrypted using the cryptographic module session key. The Security Executive application causes the generation of message authentication code using either a session key or MAC key 355. The generated MAC is then verified against the received MAC 357. If the generated MAC does not match the received MAC 359 processing ends 352, 356 as is shown in
(61) If the generated MAC does match the received MAC 359 the information is processed 361. If the received information includes a critical security parameter (CSP) 363, the CSP is used to authenticate an entity 365. If the information does not contain a CSP 363, counterpart cryptographic functions continue 340, 344 as is shown in
(62) The foregoing described embodiments of the invention are provided as illustrations and descriptions. They are not intended to limit the invention to precise form described. In particular, it is contemplated that functional implementation of the invention described herein may be implemented equivalently in hardware, software, firmware, and/or other available functional components or building blocks. No specific limitation is intended to a particular cryptographic module operating environment. Other variations and embodiments are possible in light of above teachings, and it is not intended that this Detailed Description limit the scope of invention, but rather by the Claims following herein.