发明名称 |
METHODS AND DEVICES FOR SECURING KEYS WHEN KEY-MANAGEMENT PROCESSES ARE SUBVERTED BY AN ADVERSARY |
摘要 |
The present invention discloses methods and devices for securing keys when key-management processes are subverted by an adversary. Methods include the steps of: upon receiving a creation request in the computing-environment, creating a secure key in at least one location in a computing environment by repetitively computing respective secure-key contributions: in at least one location; and in a set ofN computing resources in the computing environment, wherein N is a non-negative integer; and applying the respective secure-key contributions to change a secure-key value, wherein: the respective secure-key contributions cannot be omitted or modified by at least one location; and the secure key is never revealed to the computing resources; thereby enabling the computing resources in the computing environment to ensure that the secure key is truly random; wherein at least one location is a region of memory located in a computing resource operationally connected to the computing-environment. |
申请公布号 |
EP2945347(A1) |
申请公布日期 |
2015.11.18 |
申请号 |
EP20150167720 |
申请日期 |
2015.05.14 |
申请人 |
PORTICOR LTD. |
发明人 |
PARANN-NISSANY, GILAD;SHEFFER, YARON;ROSEN, ALON |
分类号 |
H04L29/06;H04L9/00;H04L9/08;H04L9/32 |
主分类号 |
H04L29/06 |
代理机构 |
|
代理人 |
|
主权项 |
|
地址 |
|