Proceedings on Advances in cryptology---CRYPTO '86
Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer (2nd ed.)
Exponentiation cryptosystems on the IBM PC
IBM Systems Journal
IBM Systems Journal - Special issue on cryptology
ESA/390 integrated cryptographic facility: an overview
IBM Systems Journal - Special issue on cryptology
Common cryptographic architecture cryptographic application programming interface
IBM Systems Journal - Special issue on cryptology
Key handling with control vectors
IBM Systems Journal - Special issue on cryptology
A key-management scheme based on control vectors
IBM Systems Journal - Special issue on cryptology
Transaction security system extensions to the common cryptographic architecture
IBM Systems Journal - Special issue on cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Technical note: complementarity attacks and control vectors
IBM Systems Journal
Hi-index | 0.00 |
A new method for extending the IBM Common Cryptographic Architecture (CCA) to include public key cryptography is presented. The public key extension provides nonrepudiation via digital signatures and an electronic means to distribute Data Encryption Algorithm (DEA) key-encrypting keys in a hybrid Data Encryption Algorithm. Public Key Algorithm (DEA-PKA) cryptographic system. The improvements are based on a novel method for extending the control vector concept used in the IBM Common Cryptographic Architecture. Four new key types that separate the public and private key pairs into four classes according to their broad uses within the cryptographic system are defined. The public key extension to the CCA is implemented in the IBM Transaction Security System (TSS). This paper discusses both the public key extension to the CCA and the TSS implementation of this architectural extension.