Secure protocol handshake offload using TNICs
First Claim
1. A method for offloading a secure protocol handshake, comprising:
- establishing a connection between a host system and a remote peer;
determining whether the secure protocol handshake is offloaded to a network interface card (NIC);
if the secure protocol handshake is offloaded to the NIC;
sending an offload request to offload the secure protocol handshake, wherein the offload request comprises a value of at least one cryptographic key;
performing a lookup operation on a cryptographic key table using the value of at least one cryptographic key to obtain at least one secret key, wherein the NIC comprises a key store, and wherein the key store comprises the cryptographic key table;
performing cryptographic operations associated with the secure protocol handshake using the at least one secret key; and
returning a status of the secure protocol handshake to the host system.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for offloading a secure protocol handshake. The method includes establishing a connection between a host system and a remote peer, and determining whether the secure protocol handshake is offloaded to a network interface card (NIC). When the secure protocol handshake is offloaded to the NIC, an offload request is sent to offload the secure protocol handshake, where the offload request includes a value of at least one cryptographic key. The method further includes performing cryptographic operations associated with the secure protocol handshake using the value of at least one cryptographic key to obtain at least one secret key, and returning a status of the secure protocol handshake to the host system.
22 Citations
18 Claims
-
1. A method for offloading a secure protocol handshake, comprising:
-
establishing a connection between a host system and a remote peer; determining whether the secure protocol handshake is offloaded to a network interface card (NIC); if the secure protocol handshake is offloaded to the NIC; sending an offload request to offload the secure protocol handshake, wherein the offload request comprises a value of at least one cryptographic key; performing a lookup operation on a cryptographic key table using the value of at least one cryptographic key to obtain at least one secret key, wherein the NIC comprises a key store, and wherein the key store comprises the cryptographic key table; performing cryptographic operations associated with the secure protocol handshake using the at least one secret key; and returning a status of the secure protocol handshake to the host system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for offloading a secure protocol handshake, comprising:
-
a host configured to; determine whether the secure protocol handshake is offloaded to a network interface card (NIC), and if the secure protocol handshake is offloaded to the NIC; send an offload request to offload the secure protocol handshake to a NIC, wherein the offload request comprises a value of at least one cryptographic key; and the NIC configured to; perform a lookup operations on a cryptographic key table using the value of at least one cryptographic key to obtain at least one secret key, wherein the NIC comprises a key store, and wherein the key store comprises the cryptographic key table; perform cryptographic operations associated with the secure protocol handshake using the at least one secret key; and return the status of the secure protocol handshake to the host system. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer system for offloading a secure protocol handshake, comprising:
-
a processor; a memory; a storage device; and software instructions stored in the memory for enabling the computer system under control of the processor, to; establish a connection between a host system and a remote peer; determine whether the secure protocol handshake is offloaded to a network interface card (NIC); if the secure protocol handshake is offloaded to the NIC; send an offload request to offload the secure protocol handshake, wherein the offload request comprises a value of at least one cryptographic key; perform a lookup operation on a cryptographic key table using the value of at least one cryptographic key to obtain at least one secret key, wherein the NIC comprises a key store, and wherein the key store comprises the cryptographic key table; perform cryptographic operations associated with the secure protocol handshake using the at least one secret key; and return a status of the secure protocol handshake to the host system.
-
Specification