HSM-level BLOB storage key
  • 23 Jan 2025
  • 2 Minutes à lire
  • Sombre
    Lumière
  • PDF

HSM-level BLOB storage key

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

The HSM-level BLOB storage key is used to encrypt the sensitive Digipass information of the authenticator application BLOB for long-term storage.

The HSM-level BLOB storage key is only used for authenticator applications.

This key is generated by the customer within the HSM and has the following properties:

  • This key is either:

    • Double-length 3DES key (128 bits, including parity bits)
    • Triple-length 3DES key (192 bits, including parity bits)(triple-length highly recommended)
    • AES-128 key (128 bits) or
    • AES-256 key (256 bits)
  • This key is generated in the customer’s hardware security module.
  • In the hardware security module, this key is identified by a name.
  • This key is not exportable from production hardware security module in clear.
  • Key rotation takes place on a regular basis, expected to be two years at most.

It is highly recommended to no longer use HSM-level BLOB storage keys that are double-length 3DES keys, and to use HSM-level BLOB storage keys that are triple-length 3DES or AES keys instead. See Compatibility of HSM-level BLOB storage key with authenticator application for the compatibility matrix of HSM-level BLOB storage keys with authenticator applications.

The Thales ProtectServer2 HSMs (firmwares version 5.00.02 and above) apply a restriction on double-length 3DES keys when the HSM is configured with the FIPS Algorithm Only flag enabled. Usage of double-length 3DES keys with Authentication Suite Server SDK for Thales ProtectServer HSM requires the ProtectServer2 HSMs to be configured with the FIPS Algorithm Only flag disabled.

Compatibility of HSM-level BLOB storage key with authenticator application

Table: Compatibility of HSM-level BLOB storage key with authenticator application summarizes the compatibility of the 3DES or AES HSM storage keys with the different types of authenticator application embedded in a authenticator application BLOB (HSM encrypted).

  Table:  Compatibility of HSM-level BLOB storage key with authenticator application

authenticator application key type in DPXHSM encrypted

HSM transport key type
3DES HSM keyAES HSM key
DES Digipass secret keyXNot supported (1)
3DES Digipass secret keyXNot supported (1)
DES Digipass UnlockV1 keyXNot supported (1)
AES Digipass secret keyXX
SM3 Digipass secret keyXX
OATH HMAC-SHA1 Digipass secret keyNot supported (2)Not supported (2)

When using HSM transport keys of type AES-128 or AES-256, the following authenticator applications will not be supported anymore:

  • authenticator applications using DES or 3DES
  • authenticator applications using the UnlockV1 unlocking mechanism (UnlockV1 is based on a DES key)

For Digipass using DES, 3DES algorithm, and/or UnlockV1 unlocking, the hardware encryption with HSM transport keys will have to mandatorily use 3DES HSM keys.

The authenticator application based on OATH (HOTP, TOTP, OCRA) do not support double encrypted DPX files (HSM encrypted), and are not supported for Authentication Suite Server SDK for Thales ProtectServer HSM.


Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle