Intel Corporation
Management of keys for use in cryptographic computing
Last updated:
Abstract:
A method comprising executing, by a core of a processor, a first instruction requesting access to a parameter associated with data for storage in a main memory coupled to the processor, the first instruction including a reference to the parameter, a reference to a wrapping key, and a reference to an encrypted encryption key, wherein execution of the first instruction comprises decrypting the encrypted encryption key using the wrapping key to generate a decrypted encryption key; requesting transfer of the data between the main memory and the processor core; and performing a cryptographic operation on the parameter using the decrypted encryption key.
Status:
Grant
Type:
Utility
Filling date:
20 Dec 2019
Issue date:
19 Apr 2022