Intel Corporation
Binding of cryptographic operations to context or speculative execution restrictions

Last updated:

Abstract:

A processor comprising a first register to store a wrapping key, a second register to store a pointer to a handle stored in a memory coupled to the processor, the handle comprising a cryptographic key encrypted using the wrapping key, and a core to execute a decryption instruction. The core is to, responsive to the decryption instruction, identify, in the decryption instruction, a pointer to ciphertext stored in the memory, retrieve the ciphertext and the handle from the memory, decrypt the cryptographic key of the handle based on the wrapping key, and decrypt the ciphertext based on the decrypted cryptographic key.

Status:
Grant
Type:

Utility

Filling date:

20 Dec 2019

Issue date:

15 Feb 2022