IBM 2 Computer Hardware User Manual


 
CCA Release 2.54
Figure B-11. RSA Private Key, 1024-Bit Modulus-Exponent Format with OPK
Offset
(Bytes)
Length
(Bytes)
Description
000 001 X'06' Section identifier, RSA private key, modulus-exponent format
(RSA-PRIV). This section type is created by the IBM 4758 Version 2 CCA
Support Program. This section type provides compatibility and
interchangeability with the CCF hardware in S/390 processors.
001 001 The version number (X'00')
002 002 Length of the RSA private-key section X'0198' (408 decimal)
004 020 SHA-1 hash value of the private-key subsection cleartext, offset 28 up to and
including the modulus that ends at offset 363
024 004 Reserved, binary zero
028 001 Key format and security
X'02' Encrypted RSA private-key with OPK
029 001 Private key source:
X'21' Imported from cleartext
X'22' Imported from ciphertext
X'23' Generated using regeneration data
X'24' Randomly generated
030 020 SHA-1 hash of all optional sections that follow the public key section, if any,
else 20 bytes of X'00'
050 001 Key usage flag bits
The two high-order bits indicate permitted key usage in the decryption of
symmetric keys and in the generation of digital signatures. Useful
combinations:
X'00' Only signature generation (SIG-ONLY)
X'C0' Only key unwrapping (KM-ONLY)
X'80' Both signature generation and key unwrapping (KEY-MGMT).
All other bits, reserved, B'0'
051 003 Reserved, binary zero
054 006 Reserved, binary zero
060 048 Object Protection Key (OPK); six 8-byte values: confounder, three key
values, and two initialization vector values.
The asymmetric master key encrypts the OPK using the EDE3 algorithm.
See “Triple-DES Ciphering Algorithms” on page D-10.
108 128 Private-key exponent, d. d=e
-1
mod((p-1)(q-1)), 1<d<n, and where e is the
public exponent.
The OPK encrypts the private key exponent using the EDE5 algorithm. See
“Triple-DES Ciphering Algorithms” on page D-10 and Figure D-9 on
page D-12.
236 128 Modulus, n. n=pq, where p and q are prime and 2
512
<n<2
1024
364 016 Asymmetric-keys master key verification pattern
380 020 SHA-1 hash value of the subsection cleartext, offset 400 to the section end.
This hash value is checked after an enciphered private key is deciphered for
use. This hash would protect blinding information if that were required by a
future design; see earlier Basic Services manuals.
400 002 Reserved, binary zero
402 002 Reserved, binary zero
404 002 Reserved, binary zero
406 002 Reserved, binary zero
Appendix B. Data Structures B-13