Intel corporation (20240106644). MITIGATION OF SIDE CHANNEL ATTACKS ON PLATFORM INTERCONNECTS USING ENDPOINT HARDWARE BASED DETECTION, SYNCHRONIZATION AND RE-KEYING simplified abstract
Contents
- 1 MITIGATION OF SIDE CHANNEL ATTACKS ON PLATFORM INTERCONNECTS USING ENDPOINT HARDWARE BASED DETECTION, SYNCHRONIZATION AND RE-KEYING
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 MITIGATION OF SIDE CHANNEL ATTACKS ON PLATFORM INTERCONNECTS USING ENDPOINT HARDWARE BASED DETECTION, SYNCHRONIZATION AND RE-KEYING - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
MITIGATION OF SIDE CHANNEL ATTACKS ON PLATFORM INTERCONNECTS USING ENDPOINT HARDWARE BASED DETECTION, SYNCHRONIZATION AND RE-KEYING
Organization Name
Inventor(s)
Aditya Katragada of Austin TX (US)
Geoffrey Strongin of Tigard OR (US)
Prakash Iyer of Portland OR (US)
Rajesh Banginwar of Bangalore (IN)
Gary Wallichs of San Jose CA (US)
MITIGATION OF SIDE CHANNEL ATTACKS ON PLATFORM INTERCONNECTS USING ENDPOINT HARDWARE BASED DETECTION, SYNCHRONIZATION AND RE-KEYING - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240106644 titled 'MITIGATION OF SIDE CHANNEL ATTACKS ON PLATFORM INTERCONNECTS USING ENDPOINT HARDWARE BASED DETECTION, SYNCHRONIZATION AND RE-KEYING
Simplified Explanation
The patent application describes a system and method for enhancing the mitigation of side channel attacks on platform interconnects using endpoint hardware-based detection, synchronization, and re-keying.
- Generating a set of keys for link encryption based on a high entropy seed
- Storing the set of keys in a deterministic order in a register
- Detecting when a re-key programmable threshold is met during link encryption with a device
- Identifying a synchronization point associated with the device
- Synchronizing a rekeying event with the device
Potential Applications
This technology could be applied in secure communication systems, data centers, cloud computing environments, and IoT devices.
Problems Solved
This technology helps prevent side channel attacks on platform interconnects, enhancing overall security and data protection.
Benefits
Improved security, enhanced data protection, and increased resilience against side channel attacks.
Potential Commercial Applications
Secure communication systems, data encryption products, cybersecurity solutions, and IoT device security.
Possible Prior Art
Prior art in the field of hardware-based encryption and key management systems may exist, but specific examples are not provided in the abstract.
Unanswered Questions
How does this technology impact system performance?
The abstract does not mention the potential impact on system performance, such as latency or throughput.
Are there any compatibility requirements for implementing this technology?
It is not clear from the abstract if there are any specific compatibility requirements for integrating this technology into existing systems or devices.
Original Abstract Submitted
a system and method of enhancing the mitigation of side channel attacks on platform interconnects using endpoint hw based detection, synchronization, and re-keying include generating a set of keys for link encryption based on a high entropy seed, storing the set of keys in a deterministic order in a register, detecting that a re-key programmable threshold is met during link encryption with a device, identifying a synchronization point associated with the device, where the synchronization point indicates the device is ready to switch a current key used for link encryption, and synchronizing a rekeying event with the device.