BLOBs migration from Thales ProtectServer HSM to Authentication Suite Server SDK for Entrust nShield HSM
  • 23 Jan 2025
  • 1 Minute à lire
  • Sombre
    Lumière
  • PDF

BLOBs migration from Thales ProtectServer HSM to Authentication Suite Server SDK for Entrust nShield HSM

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

The following steps are provided to perform a successful BLOB migration of hardware-encrypted BLOBs used on a former Authentication Suite Server SDK for Thales ProtectServer HSM. It is protected by a former HSM-level BLOB storage key 1 and optionally by an initial vector 1:

  1. On the former Thales ProtectServer HSM side, with the Thales ProtectServer key management utility (KMU):
    • Generate a Key Encrypting Key KEK (3DES key split in 2 or 3 components). Write down the components and the key KCV.
    • Generate a HSM-level BLOB transport key 2 (3DES Key). Write key KCV.
    • Export this HSM-level BLOB transport key 2 wrapped by the KEK.

The KEK must be created with the following key attributes set to TRUE:

  • Sensitive
  • Export

The HSM-level BLOB transport key 2 must be created with the following key attributes set to TRUE:

  • Sensitive
  • Exportable
  • Wrap
  • Unwrap
  1. With the former Authentication Suite Server SDK for Thales ProtectServer HSM, migrate the hardware-encrypted BLOBs (authenticator application BLOBs and payload key BLOBs if any) from HSM-level BLOB storage key 1 and initial vector 1 (if any) to HSM-level BLOB transport key 2. Optionally also migrate the initial vector 2, that will result in hardware-encrypted BLOBs in a format that is ready for export.
  2. On the Entrust nShield HSM side, with Key Management Tool (see Key management utility):
  3. With Authentication Suite Server SDK for Entrust nShield HSM, migrate hardware-encrypted BLOBs obtained in step 2 from the reconstructed HSM-level BLOB transport key 2 and from initial vector 2 (if any) to HSM-level BLOB storage key 3 and optionally initial vector 3. This results in the hardware-encrypted BLOBs being provided in the Entrust nShield format.

It is possible to use the hardware-encrypted BLOBs obtained in step 4 with the HSM-level BLOB storage key 3 and the initial vector 3 (if any) for operations with Authentication Suite Server SDK for Entrust nShield HSM, for example OTP validation (AS functions AAL2GenVerifyPasswordCmdEx and AAL2ProcVerifyPasswordReply).


Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle