Intel corporation (20240106644). MITIGATION OF SIDE CHANNEL ATTACKS ON PLATFORM INTERCONNECTS USING ENDPOINT HARDWARE BASED DETECTION, SYNCHRONIZATION AND RE-KEYING simplified abstract

From WikiPatents
Jump to navigation Jump to search

MITIGATION OF SIDE CHANNEL ATTACKS ON PLATFORM INTERCONNECTS USING ENDPOINT HARDWARE BASED DETECTION, SYNCHRONIZATION AND RE-KEYING

Organization Name

intel corporation

Inventor(s)

Aditya Katragada of Austin TX (US)

Geoffrey Strongin of Tigard OR (US)

Prakash Iyer of Portland OR (US)

Rajesh Banginwar of Bangalore (IN)

Poh Thiam Teoh of Penang (MY)

Gary Wallichs of San Jose CA (US)

MITIGATION OF SIDE CHANNEL ATTACKS ON PLATFORM INTERCONNECTS USING ENDPOINT HARDWARE BASED DETECTION, SYNCHRONIZATION AND RE-KEYING - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240106644 titled 'MITIGATION OF SIDE CHANNEL ATTACKS ON PLATFORM INTERCONNECTS USING ENDPOINT HARDWARE BASED DETECTION, SYNCHRONIZATION AND RE-KEYING

Simplified Explanation

The patent application describes a system and method for enhancing the mitigation of side channel attacks on platform interconnects using endpoint hardware-based detection, synchronization, and re-keying.

  • Generating a set of keys for link encryption based on a high entropy seed
  • Storing the set of keys in a deterministic order in a register
  • Detecting when a re-key programmable threshold is met during link encryption with a device
  • Identifying a synchronization point associated with the device
  • Synchronizing a rekeying event with the device

Potential Applications

This technology could be applied in secure communication systems, data centers, cloud computing environments, and IoT devices.

Problems Solved

This technology helps prevent side channel attacks on platform interconnects, enhancing overall security and data protection.

Benefits

Improved security, enhanced data protection, and increased resilience against side channel attacks.

Potential Commercial Applications

Secure communication systems, data encryption products, cybersecurity solutions, and IoT device security.

Possible Prior Art

Prior art in the field of hardware-based encryption and key management systems may exist, but specific examples are not provided in the abstract.

Unanswered Questions

How does this technology impact system performance?

The abstract does not mention the potential impact on system performance, such as latency or throughput.

Are there any compatibility requirements for implementing this technology?

It is not clear from the abstract if there are any specific compatibility requirements for integrating this technology into existing systems or devices.


Original Abstract Submitted

a system and method of enhancing the mitigation of side channel attacks on platform interconnects using endpoint hw based detection, synchronization, and re-keying include generating a set of keys for link encryption based on a high entropy seed, storing the set of keys in a deterministic order in a register, detecting that a re-key programmable threshold is met during link encryption with a device, identifying a synchronization point associated with the device, where the synchronization point indicates the device is ready to switch a current key used for link encryption, and synchronizing a rekeying event with the device.