--
You received this message because you are subscribed to the Google Groups "Keystone Enclave Forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to keystone-enclave-...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/keystone-enclave-forum/268b2de1-21bf-4831-9158-f16b1607bedf%40googlegroups.com.
To unsubscribe from this group and stop receiving emails from it, send an email to keystone-enclave-...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/keystone-enclave-forum/597df032-5921-fc5d-5fff-32c97c11cf74%40fortanix.com.
| 1 2 3 4 5 6 7 8 | Hello, I wrote my bachelor's thesis about the creation of a sealing feature in Keystone. My mechanism is similar to the SGX implementation. I derive the sealing key from the private security monitor key, the hash of the enclave and an input, chosen by the user, to enable the derivation of multiple keys from one enclave. With that mechanism the sealing key is bound to the identity of the hardware, the security monitor and the enclave. This key can be used to seal data similar to the SGX sealing feature. I already implemented this feature in the security monitor (C and Rust) and created a pull request. Regards, Benedikt Kopf |
--
You received this message because you are subscribed to the Google Groups "Keystone Enclave Forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to keystone-enclave-...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/keystone-enclave-forum/b3bdcc32-20f7-4a5f-adfd-5023f4181533%40googlegroups.com.