Authenticating secure channel establishment messages based on shared-secret

    公开(公告)号:US10411886B1

    公开(公告)日:2019-09-10

    申请号:US14983242

    申请日:2015-12-29

    IPC分类号: H04L9/08 H04L9/32 H04L29/06

    摘要: Systems and processes are described for establishing and using a secure channel. A shared secret may be used for authentication of session initiation messages as well as for generation of a private/public key pair for the session. A number of ways of agreeing on the shared secret are described and include pre-sharing the keys, reliance on a key management system, or via a token mechanism that uses a third entity to manage authentication, for example. In some instances, the third party may also perform endpoint selection by providing a particular endpoint along with the token. The particular cipher suite applied in a particular implementation may be configurable. The process is applicable to either implicit key confirmation (e.g., handshake negotiation) or explicit key confirmation (e.g., full negotiation).

    Efficient use of keystreams
    33.
    发明授权

    公开(公告)号:US10313319B2

    公开(公告)日:2019-06-04

    申请号:US15945975

    申请日:2018-04-05

    摘要: Performing cryptographic operations such as encryption and decryption may be computationally expensive. In some contexts, initialization vectors and keystreams operable to perform encryption operations are generated and stored in a repository, and later retrieved for use in performing encryption operations. Multiple devices in a distributed system can each generate and store a subset of a larger set of keystreams.

    Signed envelope encryption
    34.
    发明授权

    公开(公告)号:US10243968B2

    公开(公告)日:2019-03-26

    申请号:US14967142

    申请日:2015-12-11

    摘要: Clients within a computing environment may establish a secure communication session. Sometimes, a client may trust another client to read, but not modify, a message. Clients may utilize a cryptography service to generate a message protected against improper modification. Clients may utilize a cryptography service to verify whether a protected message has been improperly modified.

    Public key rollup for merkle tree signature scheme

    公开(公告)号:US10230525B2

    公开(公告)日:2019-03-12

    申请号:US15389686

    申请日:2016-12-23

    摘要: An organizational signature authority delegates signature authority to one or more subordinate signature authorities by rolling up public keys from the subordinate signature authorities into a public key for the organization. A subordinate signature authority of the organizational signature authority generates cryptographic keys for use by the subordinate signature authority, and cryptographically derives a public key for the subordinate signature authority based at least in part on the cryptographic keys. In some examples, the subordinate signature authority acquires public keys from a lower subordinate signature authority, and the public key of the subordinate signature authority is cryptographically derived in part from the public key of the lower subordinate signature authority. The public key of the subordinate signature authority is provided to the organizational signature authority. A hash tree is generated from the public keys of the subordinate signature authorities to create the public key for the organization.

    CRYPTOGRAPHIC KEY MANAGEMENT FOR IMPORTED CRYPTOGRAPHIC KEYS

    公开(公告)号:US20190068363A1

    公开(公告)日:2019-02-28

    申请号:US16174033

    申请日:2018-10-29

    IPC分类号: H04L9/08

    摘要: A cryptographic key management service receives a request to import a first cryptographic key. In response to the request, the service creates a public cryptographic key and a private cryptographic key. The private cryptographic key is encrypted using a second cryptographic key to create an import key token. The import key token and the public cryptographic key are provided in response to the request. The service receives an encrypted first cryptographic key, which the service decrypts using the private cryptographic key to obtain the first cryptographic key. The service stores the first cryptographic key and enables its use for the performance of cryptographic operations.

    Trusted malware scanning
    38.
    发明授权

    公开(公告)号:US10133867B1

    公开(公告)日:2018-11-20

    申请号:US15083728

    申请日:2016-03-29

    IPC分类号: G06F21/56 H04L29/06 H04L9/32

    摘要: A trusted co-processor can provide a hardware-based observation point into the operation of a host machine owned by a resource provider or other such entity. The co-processor can be installed via a peripheral card on a fast bus, such as a PCI bus, on the host machine. The co-processor can execute malware detection software, and can use this software to analyze data and/or code obtained from the relevant resources of the host machine. The trusted co-processor can notify the customer or another appropriate entity of the results of the scan, such that an appropriate action can be taken if malware is detected. The results of the scan can be trusted, as malware will be unable to falsify such a notification or modify the operation of the trusted co-processor.

    Signature delegation
    39.
    发明授权

    公开(公告)号:US10129034B2

    公开(公告)日:2018-11-13

    申请号:US15946614

    申请日:2018-04-05

    摘要: A signature authority generates a master seed value that is used to generate a seed tree of subordinate nodes. Each subordinate node of the seed tree is generated from the value of its parent node using a cryptographic hash or one-way function. The signature authority selects subordinate seed values from the seed tree which are distributed to one or more subordinates, each of which generates a set of one-time-use cryptographic keys from the provided seed. Each subordinate generates a hash tree from its set of one-time-use cryptographic keys, and returns the root of its hash tree to the signature authority. The signature authority integrates the hashes provided by the key generators into a comprehensive hash tree, and the root of the hash tree acts as a public key for the signature authority.