1. Field
The present invention relates digital cryptography and, more particularly, to cryptographic hardware devices.
2. Brief Description of Related Developments
Various techniques are known for encrypting and decrypting digital messages, as well as for authenticating of digital messages with the use of digital signatures. A lack of security in the transmission of email has led to wide use of these techniques, with the goal of keeping transmitted information private. Known digital cryptographic and digital signature systems require the use of cryptographic keys, which are used to encipher and decipher information. Therefore, although digital cryptography allows secure transmission of messages over non-secure networks, a problem remains in how to distribute the cryptographic keys in a secure fashion. The development of public-key cryptography has provided a partial solution. It uses a public key to encipher information and a private key to decipher the information, where the private key is extremely difficult to compute from the public key. This way, a sender may use a broadly distributed public key to encipher a message and may then transmit the encrypted message over an insecure network. If the message is intercepted, it cannot be deciphered without the private key. Thus, only the intended recipient should be able to decipher the message, as only he has the private key. However, for a public-key encryption system to function in a secure manner, some means of authenticating the public key is required. Otherwise, there exists the possibility that one may falsely represent an interceptor's public key as that of the recipient. Then, when the enciphered message is intercepted, it may be decoded with the interceptor's private key. This is possible as the message was enciphered with the interceptor's public key, falsely represented as the public key of the intended recipient. Therefore, a secure technique for distributing cryptographic keys may be desirable.
In one embodiment of the present invention, a cryptographic device comprises a memory pre-programmed with a cryptographic key. The device further comprises a data processor connected to the memory for deciphering data with the cryptographic key, and also comprises n interface for connecting the data processor to a computer.
In another embodiment of the present invention, a method for distributing private keys for use in a public cryptographic system comprises generating an asymmetric key pair comprising a public cryptographic key and a private cryptographic key. The method further comprises storing the private cryptographic key on a portable hardware device wherein the portable hardware device comprises a memory for storing the private cryptographic key, a decryption unit for decrypting data with the private cryptographic key, and a physical data connector for connecting the device to a computer. The method further comprises sending the portable hardware device, with the private cryptographic key stored thereon, to an intended recipient of the encrypted message. The method also comprises encrypting the data with the public cryptographic key, and transmitting the encrypted data to the portable hardware device for decryption of the data by the device.
The foregoing aspects and other features of the present invention are explained in the following description, taken in connection with the accompanying drawings, wherein:
To achieve security of messaging over insecure transmission paths, digital cryptography may be used.
In an exemplary embodiment of the present invention, interface 210 may be a USB connector and a case 240 may house the data processor 220 and memory 230. The case 240 may be small enough to make the device 150. For example, device 150 may be made small enough to be kept on a key ring or in one's pocket. In another exemplary embodiment of the present invention, device 150 may be a smart card that is roughly or the same width and length of a standard business card, and interface 210 may be a smart card interface comprising electrical contacts for connecting to a smart card reader. In yet another embodiment, interface 210 may be a wireless interface. As unencrypted data may be sent through the interface 210, such a wireless interface may operate at low power, with high directionality, or in a secure environment, to prevent interception of the messages.
Generation of the key pair may be done by the operator of the first computer system 110, but could be done by some other party. In step 320, the private key that has been generated in step 310 is stored on hardware device 150. In step 330, hardware device 150, now pre-programmed with the private cryptographic key, is sent to an intended recipient of messages. Additional steps may also be taken. For example, one or more public keys belonging to the operator of first computer subsystem 110, or of other parties, may also be pre-programmed on the hardware device 150. In addition, the hardware device may be programmed with a password or passphrase that is required to operate the hardware device 150. This may be done by using another cryptographic key as the password and storing the cryptographic key in an enciphered form. In this way, it is not possible to access the private key on the hardware device 150, regardless of how the device is tampered with, because additional information is required, that information being the passphrase.
In step 340, message is enciphered with the public cryptographic key that was generated in step 310. It should be recognized that the enciphering of the message need not occur subsequent to step 320 or 330, although it may, because the message may be enciphered as long as a key has been generated with which to encipher it. The enciphered message is sent to the hardware device in step 350. And in step 360, the message is deciphered by the data processor 220 using the private cryptographic key stored in the memory 230 on the hardware device 150.
It will be recognized that the messages enciphered and deciphered in the above description using the asymmetric cryptographic key pair may themselves be cryptographic keys, and more specifically they may be session keys. The session keys may be symmetric keys that are used to encipher end decipher the remaining bulk of the transmitted messages. This may be done to increase efficiency, as algorithms for enciphering an deciphering based on symmetric keys may be computed faster than those based on asymmetric keys. However, symmetric keys may lack the public key/private key dichotomy, and therefore may be unsuitable for some applications without the additional use of asymmetric keys.
An example of where the above described apparatus and method may be used is the case of a bank and an account holder. These two parties may wish to exchange sensitive information such as account numbers and balances, debit card PINs, social security numbers, and the like. The account holder's representative may physically visit a bank branch to establish a passphrase for the hardware device 150. The bank may then generate the asymmetric key pair and store it on the hardware device along with any other desired information. The bank may then send the device to the account holder via a common carrier or a courier. The account holder and bank may then use the device 150 as described above. In this way, it is difficult for a third party to fully breach the security measures. The third party would have to intercept the message, would have to physically obtain the device, and would also have to obtain the passphrase. Note that the private key does not ever need to leave the hardware device 150. Thus, even if a hacker is able to access the contents of the account holder's computer, the private key will not be stolen. Also, the problem of authenticating a public key to an intended recipient is solved by the use of the passphrase in combination of the physical sending of the device 150 to a physical address specified by the recipient. This may reduce or eliminate the need for digital certificate authorities and related security concerns.
It should be understood that the foregoing description is only illustrative of the invention. Various alternatives and modifications can be devised by those skilled in the art without departing from the invention. Accordingly, the present invention is intended to embrace all such alternatives, modifications and variances which fall within the scope of the claims.