Object and cacheline granularity cryptographic memory integrity

    公开(公告)号:US11954045B2

    公开(公告)日:2024-04-09

    申请号:US17485213

    申请日:2021-09-24

    申请人: Intel Corporation

    摘要: Technologies disclosed herein provide one example of a system that includes processor circuitry and integrity circuitry. The processor circuitry is to receive a first request associated with an application to perform a memory access operation for an address range in a memory allocation of memory circuitry. The integrity circuitry is to determine a location of a metadata region within a cacheline that includes at least some of the address range, identify a first portion of the cacheline based at least in part on a first data bounds value stored in the metadata region, generate a first integrity value based on the first portion of the cacheline, and prevent the memory access operation in response to determining that the first integrity value does not correspond to a second integrity value stored in the metadata region.

    Processor hardware and instructions for lattice based cryptography

    公开(公告)号:US11792005B2

    公开(公告)日:2023-10-17

    申请号:US17699830

    申请日:2022-03-21

    申请人: Intel Corporation

    IPC分类号: H04L9/40 H04L9/30

    CPC分类号: H04L9/3093 H04L2209/12

    摘要: A method comprises fetching, by fetch circuitry, an encoded butterfly instruction comprising an opcode, a first source identifier, a second source identifier, a third source identifier, and two destination identifiers, decoding, by decode circuitry, the decoded butterfly instruction to generate a decoded butterfly instruction, and executing, by execution circuitry, the decoded butterfly instruction to retrieve operands representing a first input polynomial-coefficient from the first source, a second input polynomial-coefficient from the second source, and a primitive nth root of unity from the third source, perform, in an atomic fashion, a butterfly operation to generate a first output polynomial-coefficient and a second output polynomial-coefficient, and store the first output coefficient and the second output coefficient in a register file accessible to the execution circuitry.

    POLYNOMIAL MULTIPLICATION FOR SIDE-CHANNEL PROTECTION IN CRYPTOGRAPHY

    公开(公告)号:US20230091951A1

    公开(公告)日:2023-03-23

    申请号:US17478579

    申请日:2021-09-17

    申请人: Intel Corporation

    摘要: Polynomial multiplication for side-channel protection in cryptography is described. An example of a apparatus includes one or more processors to process data; a memory to store data; and polynomial multiplier circuitry to multiply a first polynomial by a second polynomial, the first polynomial and the second polynomial each including a plurality of coefficients, the polynomial multiplier circuitry including a set of multiplier circuitry, wherein the polynomial multiplier circuitry is to select a first coefficient of the first polynomial for processing, and multiply the first coefficient of the first polynomial by all of the plurality of coefficients of the second polynomial in parallel using the set of multiplier circuits.

    Accelerating multiple post-quantum cryptograhy key encapsulation mechanisms

    公开(公告)号:US11569994B2

    公开(公告)日:2023-01-31

    申请号:US17356972

    申请日:2021-06-24

    申请人: Intel Corporation

    IPC分类号: H04L9/30 H04L9/06 H04L9/14

    摘要: An accelerator includes polynomial multiplier circuitry including at least one modulus multiplier operating according to a mode. The at least one modulus multiplier include a multiplier to multiply two polynomial coefficients to generate a multiplication result, a power of two reducer to reduce the multiplication result to a reduced multiplication result when the mode is a power of two mode, and a prime modulus reducer to reduce the multiplication result to the reduced multiplication result when the mode is a prime modulus mode.

    Hardware mechanisms for link encryption

    公开(公告)号:US11533170B2

    公开(公告)日:2022-12-20

    申请号:US16368800

    申请日:2019-03-28

    申请人: Intel Corporation

    摘要: Methods, systems, and apparatuses associated with hardware mechanisms for link encryption are disclosed. In various embodiments, an interconnect interface is coupled to a processor core to interconnect a peripheral device to the processor core via a link established between the peripheral device and the interconnect interface. The interconnect interface is to select a cryptographic engine of a plurality of cryptographic engines instantiated in the interconnect interface for the link. The cryptographic engine is to symmetrically encrypt data to be transmitted through the link. In more specific embodiments, each of the plurality of cryptographic engines is instantiated for one of a request type on the link, a virtual channel on the link, or a request type within a virtual channel on the link.

    Efficient post-quantum secure software updates tailored to resource-constrained devices

    公开(公告)号:US11516008B2

    公开(公告)日:2022-11-29

    申请号:US17133304

    申请日:2020-12-23

    申请人: Intel Corporation

    IPC分类号: H04L9/08 H04L9/06

    摘要: A method comprises receiving an image of an update for a software module, a rate parameter, an index parameter, and a public key, generating a 32-byte aligned string, computing a state parameter using the 32-byte aligned string, generating a modified message representative, computing a Merkle Tree root node, and in response to a determination that the Merkle Tree root node matches the public key, forwarding, to a remote device, the image of the update for a software module, the state parameter; and the modified message representative.