1
Vote

XORing components to form keys(with encrypted components) are always a Odd parity result / expected even parity result

description

Hi,


I am new to HSM,I am testing with the console and host commands. I am using the standard LMK test Pair set. When command sent to form key with the encrypted components , the XOR of two components results are always in odd parity and the same is encrypted. But i need / expected results must be in even parity result encrypted. Is this feasible. Please Advise

Following are the steps done:

1) Generated TMK double lenght (2) components
2) Formed the Key with Encrypted components respectively.
3) But the result XORing the two components are incorrect in the output result of Simulator. Command comparing with the result of manual XOR is done with the two components not matching.
5) CheckSum value matching.

Sample TMK Components :

Generating TMK :

command = "0000A00002U";

COMPONENT 1 CLEAR : 2934C8795E64946B8CB98C044380B0F7
Key generated (LMK): U7225E13B5D8C83C6DD1A10CB838D4CEC

COMPONENT 2 CLEAR : EFAE9DDFA18C3134641C58168F0815D5
Key generated (LMK): U2FF54082F1A7E9B43585FBE55AE15EAB


Form Key from the Encrypted components :

command ="0000A42002UU7225E13B5D8C83C6DD1A10CB838D4CECU2FF54082F1A7E9B43585FBE55AE15EAB";


=== [A4], starts 13:39:54.124 =======
[Key,Value]=[Key Component #1,7225E13B5D8C83C6DD1A10CB838D4CEC]
[Key,Value]=[Key Component #2,2FF54082F1A7E9B43585FBE55AE15EAB]
[Key,Value]=[Key Component Scheme #1,U]
[Key,Value]=[Key Component Scheme #2,U]
[Key,Value]=[Key Scheme (LMK),X]
[Key,Value]=[Key Type,002]
[Key,Value]=[Number of Components,2]

Component 1 (clear): 2934C8795E64946B8CB98C044380B0F7
Component 2 (clear): EFAE9DDFA18C3134641C58168F0815D5
Key (clear): C79B54A7FEE9A45EE9A4D513CD89A423
Check value: 2AC28D
=== [A4], ends 13:39:54.158 =======

Key (clear): C79B54A7FEE9A45EE9A4D513CD89A423


ACTUAL RESULT OF XOR FROM MANUAL PROCESS:

TMK Clear Key:
C69A55A6FFE8A55FE8A5D412CC88A522
K1 CheckSum : : 2A C2 8D


Please help.

Regards,
Vijayan

comments