Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for multi-key total memory encryption based on dynamic key derivation

A key and cryptographic key technology, applied in secure communication devices, computer security devices, key distribution, and can solve problems such as a large amount of memory

Pending Publication Date: 2021-06-29
INTEL CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, however, storing one or more encryption keys per virtual machine requires a large amount of memory, which imposes significant costs and power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for multi-key total memory encryption based on dynamic key derivation
  • Method and apparatus for multi-key total memory encryption based on dynamic key derivation
  • Method and apparatus for multi-key total memory encryption based on dynamic key derivation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In the following description, numerous specific details are set forth. However, it is understood that some embodiments may be practiced without these specific details. In other instances, well-known circuits, structures and techniques have not been shown in detail in order not to obscure the understanding of this description.

[0037] References in the specification to "one embodiment," "an embodiment," "example embodiment," etc. indicate that the described embodiment may include a feature, structure, or characteristic, but that each embodiment may not necessarily include the feature, structure, or characteristic. characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. In addition, when a feature, structure or characteristic is described with respect to an embodiment, it is considered to be within the knowledge of those skilled in the art to affect such feature, structure or characteristic with respect to other embodiments, if expl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the invention relate to a method and an apparatus for multi-key total memory encryption based on dynamic key derivation. In one example, a processor includes cryptographic circuitry, storage with multiple key splits and multiple full encryption keys; fetch and decode circuitry to fetch and decode an instruction specifying an opcode, an address, and a keylD, the opcode calling for the processor to use the address to determine whether to use an explicit key, in which case the keylD is used to select one of the multiple full encryption keys to use as a cryptographic key, and, otherwise, the processor is to dynamically derive the cryptographic key by using the keylD to select one of the multiple key splits, and provide the key split and a root key to a key derivation function to derive the cryptographic key, which is used by the encryption circuitry to perform a cryptographic operation on an the addressed memory location.

Description

technical field [0001] The field of the invention relates generally to computer processor architecture, and more particularly to methods and apparatus for dynamic key derivation-based multi-key total memory encryption (MKTME). Background technique [0002] The growing need for robust computer security has led to the widespread use of cryptography in mainstream computer systems and networks. For example, disk encryption can be used to protect data residing on persistent disk storage devices, while network encryption can be used to protect data in transit over a network. [0003] Data processing systems may use virtual machines (VMs) to provide different execution environments for different software stacks. Software used to manage VMs within a data processing system may be referred to as a hypervisor or virtual machine monitor (VMM). A data processing system that executes a VMM may be referred to as a host. In contrast, the contents of a VM may be referred to as a guest. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/72G06F21/78
CPCH04L9/08H04L9/30G06F21/72G06F21/78H04L9/0894G06F21/79G06F21/602G06F21/62H04L9/0861H04L2463/062G06F9/45558G06F21/53G06F2009/45562G06F2009/45587G06F21/107
Inventor 霍尔木兹德·M·霍萨维西达尔塔·查布拉文森特·冯·伯克恩巴里·E·亨特利韦德维亚斯·山博格拉米亚·杰亚拉姆·马斯蒂
Owner INTEL CORP