EKMS

Glossary:

 S.No TermsDescription 
 1EKMS  Enterprise Key Management System
 2 DES Data Encryption Standard
 3 AES Advanced Encryption Standard
 4 SHA1 Secure Hash Algorithm 1
 5 RSA initals of their surnames- Ron Rivest, Adi Shamir, and Leonard Adleman
 6 HMAC Keyed-Hash Message Authentication Code


1. EKMS Overview:

EKMS is implementation of RSA and it is responsible for management of both asymmetric and symmetric keys.The EKMS key manage solution provides centralized, policy-based key management and encryption. It consists of Key manager client and key manager server.

2. High Level Overview:

EKMS - Edison - 飞

Key Manager Client:

1. Represents a business application.

2. A development library that developers can integrate into a business application to obtain key retrieval and cryptographic capabilities.

3. Through this KM Client, application communicates with Key Manager Server to retrieve the key for performing Encrption/Decryption & Hashing.

Key Provider:

1.  Java servlet to service Key Manager Client requests for encryption keys

2. Use a mutually - authenticated SSL connection for the exchange of inormation between the Key Manager Clients and the Key Manager Server Provider.

Datastore:

1. Stores all administrative and operative information abt cryptographic keys, Key Classes, Application Groups, Key Policies and Key manager Clients.

2. The Administration System has write access to the database.

3. The Key Provider requires read access.

Administration System:

1. Implemented as a set of JSP and servlets.

2. User end interface to manage Key Manager Server.

3. The types of operations and administrator can perform include:

     * Create Application Groups and applications

     * Update applications(import new application certificates)

     * Create and assign Key Classes

     * Generate keys

     * Create Key Policies

     * Add users

     * Load and save Key Class definitions in a documented, XML - based configuration file.

Algorithms Used :

 S.No Function  Algorithm 
 1 Encryption AES 
 2 Decryption AES
 3 Hashing Hmac

3. EKMS Architecture Overview

EKMS - Edison - 飞

PKCS#12 File

1. PKCS#12 (Personal Information Exchange Syntax Standard)

This standard specifies a portable format for storing or transporting a user's private keys, certificates, miscellaneous secrets, etc.

("This standard describes a transfer syntax for personal identity information, including private keys, certificates, miscellaneous secrets, and extensions.  Machines, applications, browsers, Internet kiosks, and so on, that support this standard will allow a user to import, export, and exercise a single set of personal identity information")

2. A password - protected PKCS#12 formatted file stores the public key certificates and the private key.

3. Key Manager Client requires the certificates and private key to do the authentication to the Key Manager Server front-end web server during SSL connection establishment.

Config file

Stores Key Manager Client specific configuration parameters, like:

    kms.cacheTimeToLive

    kms.retries

    kms.retryDelay

    kms.debug

    kms.memoryCache

    kms.sslPKCS12File

    kms.address

    kms.cacheFile

    kms.port

    kms.sslConnectTimeout

    kms.sslPKCS12Password

Memory Cache:

1. Cache those keys response from Key Manager Server in memory in the format of clear text.

2. Non -persistent. Only available for the life of the Key Manager Client.

Disk Cache:

1. Cache those keys response from Key Manager Server in memory in the format of clear text.

2. Persistent.

3. Sequence of searching keys :   Memory Cache  --> Disk Cache --> Key Manager Server.

KM Client:

1. KM Client performs key retrieval, encryption and decryption operations on behalf of a business application.

2. Each KMC has its own unique identity within a Key Manager implementation.

3. One KMC can act on behalf of multiple business applications.

4. For the KMS, every KMC has a single set of encryption key access right.

5. KMC start process:

      1. reads and loads the config file.

      2. reads all the configuration parameters inside the config file

      3. use the PKCS#12 file name & password to unlock the PKCS file to find the asymmetric key pair which determines the Key Manager Client's authorization rights for encryption/decryption.


API (Process):

1. GetKey API

Retrieve keys for encryption, decrption and HMAC purpose.

Two kinds of key may be retrieved:

      * Currently active key from a specified Key Class  (usually used for encryption or HMAC purpose) <in KMS>

      * A key with specific key identifier (usually used for decryption or verifying an HMAC purpose) <in the response block>

Retrieve Order:

      1. Memory Cache

      2. Disk Cache

      3. KM Server

      4. Memory Cache (update, adding the new reponse key into cache)

      5. Disk Cache (update, adding the new reponse key into cache)

2. EncryptData API

Encrypts the supplied data using the current key from the specified Key Class.

The only encryption algorithm currently supported is AES.

      1. Calling the getKey API to retrieve the specified class

      2. Generated the random data to use as an Initialization Vector

      3. Performs the AES encryption operation.

      4. Prepends the key identifier of the encryption key to the ciphertext. (key+data)

      5. Prepends the Initialization Vector to the key identifier/ciphertext data block. (vetcor+key+data)

      6. Returns the Initialization Vector/key identifier/ ciphertext data block to the client application.

3. DecryptData API

 Decrypts the supplied data that was previously encrypted with the EncryptData API.

      1. Strips the Initialization Vector and the key identifier from the ciphertext.

      2. Calls the GetKey API to retrieve the specified key.

      3. Decrpts the ciphertext.

      4. Returns the cleartext to the client application.

4. HMACData API

Two kinds of keys may be used for HASH:

        * a key provided

        * the current HMAC key retrieved from KMS

The process:

      1. Calls the GetKey API to retrieve the HMAC key

      2. Performs the HMAC - SHA - 256 operation to generate the HMAC

      3. Prepends the HMAC key identifier to the HMAC

      4. Returns the key identifier /HMAC data block to the client application

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
在MATLAB中,NURBS(非均匀有理B样条)是一种强大的数学工具,用于表示和处理复杂的曲线和曲面。NURBS在计算机图形学、CAD(计算机辅助设计)、CAM(计算机辅助制造)等领域有着广泛的应用。下面将详细探讨MATLAB中NURBS的绘制方法以及相关知识点。 我们需要理解NURBS的基本概念。NURBS是B样条(B-Spline)的一种扩展,其特殊之处在于引入了权重因子,使得曲线和曲面可以在不均匀的参数空间中进行平滑插值。这种灵活性使得NURBS在处理非均匀数据时尤为有效。 在MATLAB中,可以使用`nurbs`函数创建NURBS对象,它接受控制点、权值、 knot向量等参数。控制点定义了NURBS曲线的基本形状,而knot向量决定了曲线的平滑度和分布。权值则影响曲线通过控制点的方式,大的权值会使曲线更靠近该点。 例如,我们可以使用以下代码创建一个简单的NURBS曲线: ```matlab % 定义控制点 controlPoints = [1 1; 2 2; 3 1; 4 2]; % 定义knot向量 knotVector = [0 0 0 1 1 1]; % 定义权值(默认为1,如果未指定) weights = ones(size(controlPoints,1),1); % 创建NURBS对象 nurbsObj = nurbs(controlPoints, weights, knotVector); ``` 然后,我们可以用`plot`函数来绘制NURBS曲线: ```matlab plot(nurbsObj); grid on; ``` `data_example.mat`可能包含了一个示例的NURBS数据集,其中可能包含了控制点坐标、权值和knot向量。我们可以通过加载这个数据文件来进一步研究NURBS的绘制: ```matlab load('data_example.mat'); % 加载数据 nurbsData = struct2cell(data_example); % 转换为cell数组 % 解析数据 controlPoints = nurbsData{1}; weights = nurbsData{2}; knotVector = nurbsData{3}; % 创建并绘制NURBS曲线 nurbsObj = nurbs(controlPoints, weights, knotVector); plot(nurbsObj); grid on; ``` MATLAB还提供了其他与NURBS相关的函数,如`evalnurbs`用于评估NURBS曲线上的点,`isoparm`用于生成NURBS曲面上的等参线,以及`isocurve`用于在NURBS曲面上提取特定参数值的曲线。这些工具对于分析和操作NURBS对象非常有用。 MATLAB中的NURBS功能允许用户方便地创建、编辑和可视化复杂的曲线和曲面。通过对控制点、knot向量和权值的调整,可以精确地控制NURBS的形状和行为,从而满足各种工程和设计需求。通过深入理解和熟练掌握这些工具,可以在MATLAB环境中实现高效的NURBS建模和分析。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值