Figure 1: Input trace structure for key generation process.
And command to be sent is shown as:
Figure 2: Input trace to the cryptographic key management
service.
And the returned command can be defined by the
following trace:
Figure 3: Output trace from the cryptographic key
management service.
Implementation model has been designed following
the next class deployment:
es.openkmip.attributes: are comprised by attributes
that the objects within the application should have.
Many of them are closely linked with the key
deployment in business environments.
es.openKmip.baseobject: These are the objects that
comprise most of the commands integrated in the
deployment of the key interoperability protocol. In
this section, the credential display for the
identification of who executes the action is
implemented, as well as the associated cryptographic
tasks permissions.
es.openKmip.ManagedObject: These are the
templates that integrate objects which are managed
in the protocol deployment.
es.openKmip.messajecontents: These are all
necessary labels for providing attributes to the key
generation processes.
es.openKmip.operations: All operation supported by
key management protocol. These operations are
designed for carrying out administrative tasks.
es.openKmip.pkcs11Bridge: This is a bridge that
links attributes transmitted by the proprietary
protocol commands, and are transferred to a generic
interface (educational implementation) called IAIK.
This library has been designed for Java applications
and is a cryptographic functions provider for Java
classes working with information security. Among
the many operations that IAIK performs, are
included those related to key generation, both
symmetrical and asymmetrical, data encryption and
decryption, hash functions, certificate generation
3 SERVICE DEPLOYMENT
PERFORMANCE STUDY
It has been performed a multi-thread server base on
a Runnable interface programmed in Java language,
this interface is implemented on a server that runs
several tasks:
a) Command recognition function has been
implemented.
b) Structural analysis model, based on the
definition in the KMIP protocol has been also
implemented.
c) Attributes provided from client have been
associated to be set as attributes belonging to the
RSA PKCS#11 key generations.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Object Type=’00000002’ (Symmetric Key),
Key Atributes:
Cryptographic Algorithm =’00000003’ (AES),
Key length =’128’
Mask Use performed by the Key =‘0000000C’
Tag: Request Message (0x420075), Type: Structure (0x01), Data:
Tag: Request Header (0x420074), Type: Structure (0x01), Data:
Tag: Protocol Version (0x420067), Type: Structure (0x01), Data:
Tag: Protocol Version Major (0x420068), Type: Integer (0x02), Data:
0x00000001 (1)
Tag: Protocol Version Minor (0x420069), Type: Integer (0x02), Data:
0x00000000 (0)
Tag: Batch Count (0x42000D), Type: Integer (0x02), Data: 0x00000001 (1)
Tag: Batch Item (0x42000F), Type: Structure (0x01), Data:
Tag: Operation (0x42005A), Type: Enumeration (0x05), Data: 0x00000001
(Create)
Tag: Request Payload (0x420076), Type: Structure (0x01), Data:
Tag: Object Type (0x420055), Type: Enumeration (0x05), Data: 0x00000002
(Symmetric Key)
Tag: Template-Attribute (0x42008E), Type: Structure (0x01), Data:
Tag: Attribute (0x420008), Type: Structure (0x01), Data:
Tag: Attribute Name (0x42000A), Type: Text String (0x07), Data:
Cryptographic Algorithm
Tag: Attribute Value (0x42000B), Type: Enumeration (0x05), Data:
0x00000003 (AES)
Tag: Attribute (0x420008), Type: Structure (0x01), Data:
Tag: Attribute Name (0x42000A), Type: Text String (0x07), Data:
Cryptographic Length
Tag: Attribute Value (0x42000B), Type: Integer (0x02), Data:
0x00000080 (128)
Tag: Attribute (0x420008), Type: Structure (0x01), Data:
Tag: Attribute Name (0x42000A), Type: Text String (0x07), Data:
Cryptographic Usage Mask
Tag: Attribute Value (0x42000B), Type: Integer (0x02), Data:
0x0000000C (Encrypt, Decrypt)
42007801000000C042007701000000484200670100000020420068020000000
400000001000000004200690200000004000000000000000042008F09000000
08000000004AC0731C42000D0200000004000000010000000042000F01000
0006842005A0500000004000000010000000042007C0500000004000000000
000000042007901000000404200550500000004000000020000000042009107
0000002434366563613930612D346232302D343233632D623936382D37353
066323939663063613700000000
KEOD 2010 - International Conference on Knowledge Engineering and Ontology Development
494