2 ,
N U M B E R
1 — S P R I N G
1 9 9 6
CryptoBytes
R S A L A B O R A T O R I E S ’
Contents
1 Asymmetric E c y t o :E o u i n nrpin vlto and Enhancements 2 Eio' Nt dtrs oe 7 PayWo and rd Mc Mn: i ro i t Two Simple Mc i ropayment Schemes 12 Message Authentication Using Hash Functions: the HMAC Construction 16 Announcements
The technical newsletter of RSA Laboratories, a division of RSA Data Security, Inc.
A sy m m e tri c E n c ry p ti o n : Ev o lu ti o n a n d En h a n c e m e n ts
Don B. Johnson and Stephen M. Matyas
IBM Cryptography Center of Competence, MS P330 522 South Road Poughkeepsie, NY 12601 USA
When public key cryptography was invented, one o i su e w si e t f e a t es c r t a s o to f t ss a dniid s h eue rnpr f secret symmetric keys. The objectives of such a key transport mechanism keep evolving as attacks are identified, hidden assumptions are revealed, proofs of security are given, and additional capability is nee.Tepoescniusi ti atce edd h rcs otne n hs ril. W e trace the evolution of some asymmetric key transport mechanisms, starting with the method in PKCS #1 [10]. We t e d s u s i h s o i a o d r, hn ics, n itrcl re two masking techniques developed by IBM cryptographers, and the method currently under study in ANSI draft standard X9.44 RSA Key Tr n p r . asot W e then give ideas that may be useful when using elliptic curve cryptography, where t e s z o t e h ie f h block is typically much less than that used with other algorithms, for example, RSA. W e w l u e t e f l o i g t rminology: il s h olwn e Formatted block — a b o k o d t p s e a i p t lc f aa asd s nu t temtos I cnan asc o h e h d . t o t i s e ret symmetric key
Don Johnson, a senior programmer at IBM, is an architect of I M s c y t s l t o s a d t e c m a y s re re e t t v t A S B ’ r p o o u i n n h o p n ’ p snaie o NI X9.F.1 and X9.F.3, IEEE P1363, and the X/Open Crypto API workgroups. He can be contacted at dbj@VNET. . O M. IBM C Mike