The SAKEM procedure itself is an hybrid cryptographic application that makes internal use of strong cryptographic algorithms. This means that there is a Public Key Cryptography (PKC) aspect and a Secret Key Cryptography (SKC) aspect.
A PKC primitive is the backbone of the SAKEM security at the on-line registration phase. Only the issuing organization needs to establish a pair of public and private keys. The PKC primitive must establish an internal secret key between the applicant's system, device or terminal and the issuer data processing center.
Overall, the SAKEM procedure gets the largest incremental benefits from the minimal use of the PKC technology.
A small number of SKC techniques are needed in the SAKEM on-line registration phase to secure the data submitted by the applicant to the issuer. The cryptographic keys for these SKC algorithms are derived from the internal secret key established with the PKC primitive. The secret authentication key which is the outcome of the SAKEM procedure is also derived from the internal secret key. The PKC primitive and the key derivation method are secure (they prevent the recovery of any other derived key from the knowledge of a first one).
Strong encryption is provided with a block encryption algorithm, namely triple-DES used in the CBC mode of operation (double length key). Also, integrity protection is provided the classical MAC processing, namely RIPE-MAC3 (essentially, RIPE-MAC3 is the triple-DES algorithm with double-length key used for MAC processing, see [5]). This is a very straightforward arrangement, which shouldn't be put into question from the perspective of strong commercial security mechanisms. Obviously, variations of this scheme are possible, and the forthcoming replacement of (triple-)DES by one of the AES candidates may be considered after the AES selection process is completed.
In an attempt to accomodate the export regulations and other regulatory controls on the use of strong cryptography, a portion of the on-line registration data is covered by the integrity protection but not encrypted, and the SAKEM implementation details can be taylored by determining which data elements are encrypted and which are not. However, in any actual case of fielding the SAKEM procedure, the influence of crypto-regulations should be assessed properly.
In summary, the SKC portion of the SAKEM procedure implementation offered by CONNOTECH uses classical arrangements of mechanisms, without compromise on the strength of algorithms.
Reference
[1] Moreau, Thierry, Probabilistic Encryption Key Exchange, Electronics Letters, Vol. 31, number 25, 7th December 1995, pp 2166-2168
[2] Okamoto, T, and Uchiyama, S., A New Public Key Cryptosystem as Secure as Factoring, Eurocrypt'98, pp 308-318, Springer-Verlag, 1998
[3] Anderson, Ross J., and Needham, Roger, Robustness Principles for Public Key Protocols, in Advances in cryptology, CRYPTO'95, LNCS (Lecture Notes in Computer Science) 963, Springer Verlag, 1995, pp 236-247
[4] Moreau, Thierry, Automated Data Protection for Telecommunications, Electronic Transactions and Messaging using PEKE Secret Key Exchange and Other Cryptographic Algorithms, Technology Licensing Opportunity, revision 1.1, CONNOTECH Experts-Conseils Inc., Montréal, Canada, March 1996 - The annex E of this reference is available on-line.
[5] Bosselaers, Antoon, and Preneel, Bart (editors), Integrity Primitives for Secure Information Systems, Final Report of RACE Integrity Primitive Evaluation, RIPE-RACE 1040, Springer, LNCS (Lecture Notes in Computer Science) 1007, 1995