Locating cryptographic keys stored in a cache

ABSTRACT

Example embodiments provide various techniques for locating cryptographic keys stored in a cache. The cryptographic keys are temporarily stored in the cache until retrieved for use in a cryptographic operation. The cryptographic key may be located or found through reference to its cryptographic key identifier. In an example, a particular cryptographic key may be needed for a cryptographic operation. The cache is first searched to locate this cryptographic key. To locate the cryptographic key, the cryptographic key identifier that is associated with this cryptographic key is provided. In turn, the cryptographic key identifier may be used as an address into the cache. The address identifies a location of the cryptographic key within the cache. The cryptographic key may then be retrieved from the cache at the identified address and then used in the cryptographic operation.

RELATED APPLICATIONS

This application is a Continuation of U.S. patent application Ser. No.13/934,107, filed Jul. 2, 2013, entitled LOCATING CRYPTOGRAPHIC KEYSSTORED IN A CACHE, which is a Continuation of U.S. patent applicationSer. No. 12/110,631, filed Apr. 28, 2008, entitled LOCATINGCRYPTOGRAPHIC KEYS STORED IN A CACHE, now U.S. Pat. No. 8,494,168 B1;each of the aforementioned priority application being herebyincorporated by reference in its entirety for all purposes.

FIELD

The present disclosure relates generally to cryptography. In an exampleembodiment, the disclosure relates to locating cryptographic keys storedin a cache.

BACKGROUND

Without protection, data stored on storage devices (e.g., hard disks,tapes, non-volatile memories, and other storage devices) is accessibleto anyone with access to the storage devices. In particular, dataaccessible by way of a computer network, such as network storage, isespecially vulnerable to unauthorized access, modification or deletion.

To protect the stored data, the stored data may be encrypted. Ingeneral, encryption transforms the stored data using an algorithm tomake the stored data on a storage device unreadable to anyone exceptthose possessing particular cryptographic information used to encryptthe data. With such cryptographic information, the stored data may alsobe decrypted to make the stored data readable.

Currently, such cryptographic information is temporarily stored in acache until retrieved for use in a cryptographic operation. To locatesuch cryptographic information in the cache, a hash function is appliedto cryptographic information that is encrypted. This hash is then usedas an address into the cache where such cryptographic information isstored. The application of the hash function is time consuming,complicated, and slows down the overall process of encrypting anddecrypting data because a hash function needs to be applied for everylookup of such cryptographic information, which can occur frequently.

SUMMARY

Example embodiments provide various techniques for locatingcryptographic keys stored in a cache. Generally, a cryptographic key isa code, number or value that, when taken together with an encryptionalgorithm, defines a unique transformation used to encrypt or decryptdata. Cryptographic keys may be stored in a cache until thecryptographic keys are retrieved for use in a cryptographic operation. Acache is a temporary storage area where the data (e.g., cryptographickeys) stored in the cache is duplicated at another location or anotherstorage area. The cache may be used because the original data stored inthe other location takes longer to retrieve when compared to retrievingthe same, duplicated data from the cache. The cryptographic keys maytherefore be stored in a cache for fast access.

The cache may also store cryptographic key identifiers associated withthe cryptographic keys. In general, a cryptographic key identifier is avalue that refers to or identifies a particular cryptographic key. Eachcryptographic key stored in the cache may therefore be paired with acryptographic key identifier. It should be appreciated that, as asecurity feature, cryptographic keys may be stored together in a securestorage area. This secure storage area may be secured such that thecryptographic keys are not openly accessible unless with a cryptographickey identifier. A cryptographic key identifier may therefore be used tolocate a cryptographic key.

To retrieve a particular cryptographic key from the cache, thiscryptographic key is to be first located within the cache. Thecryptographic key may be located or found through reference to itscryptographic key identifier. In an example, a particular cryptographickey may be needed for a cryptographic operation. The cache is firstsearched to locate this cryptographic key. To locate the cryptographickey, the cryptographic key identifier that is associated with thiscryptographic key is provided. In turn, the cryptographic key identifiermay be used as an address into the cache. The address identifies alocation of the cryptographic key within the cache. The cryptographickey may then be retrieved from the cache at the identified address andthen used in the cryptographic operation.

BRIEF DESCRIPTION OF DRAWINGS

The present disclosure is illustrated by way of example and notlimitation in the figures of the accompanying drawings, in which likereferences indicate similar elements and in which:

FIG. 1 depicts a simplified block diagram of a system, in accordancewith an example embodiment, for locating cryptographic keys in a cache;

FIG. 2 depicts a simplified block diagram of modules, in accordance withan example embodiment, included in security appliance;

FIG. 3 depicts a flow diagram of a general overview of a method, inaccordance with an example embodiment, for locating a cryptographic keyin a cache;

FIG. 4 depicts a block diagram illustrating a key packet, in accordancewith an example embodiment.

FIG. 5 depicts a simplified diagram of a cache, in accordance with anexample embodiment, and an example lookup of a cryptographic key fromthe cache;

FIG. 6 depicts a simplified diagram of another example of a cache, inaccordance with another example embodiment;

FIG. 7 depicts a flow diagram of detailed methods, in accordance with anexample embodiment, for locating a cryptographic key from a cache; and

FIG. 8 depicts a simplified block diagram of a machine in the exampleform of a computing system within which a set of instructions, forcausing the machine to perform any one or more of the methodologiesdiscussed herein, may be executed.

DESCRIPTION OF EXAMPLE EMBODIMENTS

The description that follows includes illustrative systems, methods,techniques, instruction sequences, and computing machine programproducts that embody the present invention. In the followingdescription, for purposes of explanation, numerous specific details areset forth in order to provide an understanding of various embodiments ofthe inventive subject matter. It will be evident, however, to oneskilled in the art that embodiments of the inventive subject matter maybe practiced without these specific details. In general, well-knowninstruction instances, protocols, structures and techniques have notbeen shown in detail.

In general, cryptography is the process of hiding information.Cryptography includes the process of concealing and revealing concealedinformation. Information may be concealed by encoding (or encrypting)the information. In turn, encoded information may revealed by decoding(or decrypting) the information. Cryptographic techniques may be appliedto secure data stored on a storage device. For example, the data storedon the storage device may be encrypted using an encryption algorithm tomake the data unreadable. The encryption algorithm is controlled by oneor more parameters called keys or cryptographic keys. A key may be usedto encrypt and decrypt information. For example, such key may be used toencrypt data stored on a storage device to make the data unreadable. Inturn, this key or another key may be used to decrypt the encrypted datato make it readable. It should be appreciated that different keys may beused for encryption and decryption, while in other instances the samekeys may be used in both operations.

The cryptographic key may be identified or located with a cryptographickey identifier, which is a value that refers to or identifies thecryptographic key. The cryptographic keys and associated cryptographickey identifiers used in cryptographic operations may be temporarilystored in a cache. The cache is a temporary storage area wherecryptographic keys can be stored for fast access. A particularcryptographic key from the cache may be needed for a cryptographicoperation. As will be explained in more detail below, the cryptographickey may be located or found in the cache through reference to itscryptographic key identifier. The use of cryptographic key identifiersto locate cryptographic keys does not require additional calculations,such as the application of a hash function to the cryptographic keys. Asa result, the cryptographic keys may be quickly located in a cache.

FIGS. 1 a and 1 b depict simplified block diagrams of systems 100 and150, in accordance with example embodiments, for locating cryptographickeys in a cache. FIG. 1 a depicts an example system 100 that includesclient 102, security appliance 104, storage system 106, storage devices110, and key management module 108. In general, storage system 106 is acomputing device that provides a storage service related to theorganization of information on writable, persistent storage devices 110,such as non-volatile memories, tapes, hard drives, optical media orother storage devices. The storage system 106 can be deployed within aStorage Area Network (SAN) or a Network Attached Storage (NAS)environment.

When used within a NAS environment, for example, storage system 106 maybe embodied as a file server that is configured to operate according toa client/server model of information delivery to thereby allow multipleclient computing devices (e.g., client 102) to access shared resources,such as files, stored on the file server. The storage of information ona NAS environment can be deployed over a computer network that includesa geographically distributed collection on interconnected communicationlinks, such as Ethernet, that allows client 102 to remotely access theinformation (e.g., files) on the file server. The client 102 cancommunicate with the file server by exchanging discrete frames orpackets of data according to predefined protocols, such as TransmissionControl/Internet Protocol (TCP/IP).

A SAN is a high-speed network that enables establishment of directconnections between storage system 106 and its storage devices 110. TheSAN may thus be viewed as an extension to a storage bus and, as such, anoperating system of storage system 106 enables access to stored datausing block-based access protocols over an extended bus. In thiscontext, the extended bus can be embodied as Fibre Channel, ComputerSystem Interface (SCSI), Internet SCSI (iSCSI) or other networktechnologies.

As shown in FIG. 1, security appliance 104 is coupled between client 102and storage system 106. The security appliance 104 intercepts a dataaccess request issued by client 102 that is destined for storage system106. The data access request may be a read request to retrieve certaindata stored on storage devices 110 coupled to storage system 106 or awrite request to store data on the storage devices. In an example writerequest, security appliance 104 intercepts the write request, encryptsthe data associated with the write request, and forwards the encrypteddata to storage system 106 for storage at a specified location (address)on one or more storage devices 110. In an example read request, securityappliance 104 intercepts the read request and forwards the read requestonto storage system 106, which returns the requested data to thesecurity appliance in encrypted form. The security appliance 104 thendecrypts the encrypted data and returns the decrypted data to client102.

The key management module 108 is configured to store and manage thecryptography keys used by security appliance 104. In effect, keymanagement module 108 serves as a repository for cryptographic keys usedin system 100. In general, a cryptographic key (or encryption key) isinformation or a parameter that controls the operation of acryptographic algorithm. For example, a cryptographic key is a code,number or value that, when taken together with an encryption algorithm,defines a unique transformation used to encrypt or decrypt data.Examples of cryptographic keys include hexadecimal 128-bit numbers,192-bit numbers, and 256-bit numbers. The security appliance 104 usesone or more cryptographic keys to encrypt and decrypt data securelystored on storage system 106. The security appliance 104 may sendrequests for cryptographic keys to key management module 108 and, inresponse, the key management module sends the requested cryptographickeys on demand to the security appliance. The key management module 108may further be configured to support multiple security appliances suchthat, when a particular security appliance 104 encounters a data accessrequest for which the security appliance does not have the appropriatecryptographic key, that security appliance accesses the key managementmodule to retrieve the appropriate cryptographic key.

When security appliance 104 receives one or more cryptographic keys fromkey management module 108, the security appliance temporarily stores thecryptographic keys in a cache, which is explained in more detail below.In the illustrative example embodiments, security appliance 104 employsstorage encryption processing module 112 to quickly locate and retrievethe cryptographic keys from the cache. The security appliance 104 maythen use the cryptographic keys in cryptographic operations.

FIG. 1 b depicts another example embodiment of system 150 that includesclient 102, storage system 106, and storage devices 110. Client 102 isin communication with storage system 106 and may access informationstored on storage devices 110. As discussed above, storage system 106 isa computing device that provides a storage service related to theorganization of information on writable, persistent storage devices 110.Here, storage system 106 includes storage encryption processing module112 and key management module 108. As a result, storage system 106 mayitself store and manage cryptography keys, receive data access requestsissued by client 102, and encrypt or decrypt data stored on or retrievedfrom storage devices 110, depending on the type of request.

FIG. 2 depicts a simplified block diagram of modules, in accordance withan example embodiment, included in security appliance 104. It should beappreciated that security appliance 104 may include a variety ofcomputing devices, such as a server, a network switch, a gateway orother computing devices. A network switch enables connectivity betweendevices, such as between a computing device and a storage device. Anexample of a network switch is a Fibre Channel switch used in SANs. Ingeneral, a Fibre Channel switch is a network switch that is compatiblewith the Fibre Channel protocol and enables connectivity between, forexample, a computing device and a Fibre Channel storage device. Nodeswithin a SAN may interconnect with each other through connection withone or more Fibre Channel switches. The Fibre Channel switch providesrouting and aliasing, name server, and zoning functions. An example of agateway is an Internet Computer System Interface (iSCSI) gateway. Ingeneral, an iSCSI gateway serves as an entrance to another network, suchas Fibre Channel, and vice versa. As such, the iSCSI gateway enablesconnectivity to iSCSI devices. For example, the iSCSI gateway may createa connection between Fibre Channel and iSCSI such that iSCSI clients canconnect to Fibre Channel storage.

The security appliance 104 may include storage encryption processingmodule 112. The storage encryption processing module 112 may furtherhost direct memory access module 202, encryption and decryption module204, and cache 206. The direct memory access module 202 allows storageencryption processing module 112 within security appliance 104 todirectly read from and write to a memory, such as cache 206. Theencryption and decryption module 204 provides storage encryptionprocessing module 112 with the capability to encrypt and decrypt data.To encrypt or decrypt data, a variety of encryption algorithms, such asAdvanced Encryption Standard (AES), can be employed to transformunencrypted data into encrypted data intended for secure storage on thestorage system or to transform encrypted data into unencrypted data.

The cryptographic keys used in the cryptographic operations aretemporarily stored in cache 206. The cache 206 is a temporary storagearea where cryptographic keys can be stored for fast access. That is, acache is a temporary storage area where the data (e.g., cryptographickeys) stored in the cache is duplicated at another location or anotherstorage area (e.g., key management module). The cache may be usedbecause the original data stored in the other location takes longer toretrieve when compared to retrieving the same, duplicated data from thecache. In an example embodiment, cache 206 may be a register, which maybe implemented in a block of volatile or non-volatile memory. Here,storage encryption processing module 112 may temporarily storecryptographic keys received from, for example, a key management modulein cache 206. The cache 206 stores a portion of the cryptographic keysfrom the key management module. For example, cache 206 may store up to16 cryptographic keys and other information associated with thecryptographic keys (e.g., cryptographic key identifiers, key signatures,and other information). The size of cache 206 may, for example, rangefrom 1 kilobyte to 1 megabyte. The encryption and decryption module 204may locate and retrieve a particular cryptographic key from cache 206for use in a cryptographic operation. As explained in more detail below,the cryptographic keys stored in cache 206 may be located by referencingthe cryptographic key identifiers associated with the cryptographickeys. In addition to storing cryptographic keys, cache 206 may also beconfigured to store other information, such as key packets and keysignatures, which is further explained in more detail below.

It should be appreciated that storage encryption processing module 112may be in the form of software that is processed by a processor. Inanother example, storage encryption processing module 112 may be in theform of firmware that is processed by Application Specific IntegratedCircuits (ASICs), which may be integrated into a circuit board.Alternatively, storage encryption processing module 112 may be in theform of one or more logic blocks included in a programmable logic device(e.g., a field-programmable gate array). The described modules may beadapted, and/or additional structures may be provided, to providealternative or additional functionalities beyond those specificallydiscussed in reference to FIG. 2. Examples of such alternative oradditional functionalities will be discussed in reference to the flowdiagrams discussed below. The modifications or additions to thestructures described in relation to FIG. 2 to implement thesealternative or additional functionalities will be implementable by thoseskilled in the art, having the benefit of the present specification andteachings.

FIG. 3 depicts a flow diagram of a general overview of a method 300, inaccordance with an example embodiment, for locating a cryptographic keyin a cache. In an example embodiment, method 300 may be implemented bystorage encryption processing module 112 of FIG. 2 and employed insecurity appliance 104. As depicted in FIG. 3, cryptographic keys andcryptographic key identifiers that are associated with the cryptographickeys are stored in the cache at 302. A cryptographic key identifier is aunique value that is assigned to a cryptographic key. The cryptographickey identifier is configured to identify or reference a particularcryptographic key. An example of a cryptographic key identifier is arandom number assigned to a particular cryptographic key. For example, acryptographic key identifier may be a random 0x64-bit hexadecimal number(e.g., 0x0000000000011bcf). As a security feature, instead ofreferencing the cryptographic key directly, a cryptographic keyidentifier may be instead used. The cryptographic keys may be storedtogether in a secure storage area, such as the key management moduledescribed in FIGS. 1 a and 1 b, such that the cryptographic keys are notopenly accessible unless with a cryptographic key identifier. As aresult of referencing the cryptographic keys with cryptographicidentifiers, the exposure of cryptographic keys is minimized incryptographic operations.

It should be appreciated that the associations or correlations of thecryptographic key identifiers with the cryptographic keys can be storedin a key management module, which may store all the cryptographic keysreferenced by a storage system. In this example, when a securityappliance needs a particular cryptographic key from the key managementmodule, the security appliance sends a cryptographic key request thatreferences a cryptographic key identifier to the key management module.The key management module retrieves the cryptographic key stored in thekey management module using the cryptographic key identifier based onthe stored associations, and then transmits the cryptographic key to thesecurity appliance.

Still referring to FIG. 3, a cryptographic key is then located in thecache through reference to a cryptographic key identifier at 304. Here,each cryptographic key identifier stored in the cache is associated witha respective cryptographic key that is also stored in the cache. Theassociation of each cryptographic key identifier with its cryptographickey is maintained within the cache. With the association, acryptographic key can be located in the cache by referencing itscryptographic key identifier. It should be appreciated that any two,distinct cryptographic keys stored in a cache cannot have identifiers,which identify the locations of the cryptographic keys, with the samevalues. Else, the cryptographic keys cannot be located in the cache. Asdiscussed above, a cryptographic key identifier is a unique value thatis assigned to a cryptographic key. As such, every cryptographic keyidentifier is unique. The cryptographic key identifier may therefore beused to uniquely identify or locate an associated cryptographic key. Ineffect, the cryptographic keys may serve as an index in the cache forlocating cryptographic keys.

For example, as explained in more detail below, the cryptographic keyidentifiers are used as addresses into the cache. An address identifiesa location in the cache. The cryptographic key identifiers therefore maybe used to locate cryptographic keys stored in the cache. A search ofone or more cryptographic keys stored in the cache may be made byreferencing their associated cryptographic key identifiers instead ofapplying a hash function. As a result, a lookup using cryptographic keyidentifiers can result in a fast lookup. As used herein, it should benoted that the terms “to lookup” and “to locate” may be usedinterchangeably.

After the cryptographic key is located in the cache, the cryptographickey is retrieved from the cache and a cryptographic operation may beperformed using the cryptographic key at 306. In an example, thecryptographic operation may be an encryption operation where thecryptographic key may be used to encrypt data. In another example, thecryptographic operation may be a decryption operation where thecryptographic key may be used to decrypt data.

FIG. 4 depicts a block diagram illustrating a key packet 402, inaccordance with an example embodiment. Key packet 402 may be a 128 bytesstructure that includes cryptographic key identifier 406, encryptedcryptographic key 408, encrypted signing key 410, and key signature 412.A storage encryption processing module may receive key packet 402 and acryptographic key can be located from a cache based on the key packet.

The cryptographic key identifier 406 may be 32 bytes in size and isassociated with or configured to identify encrypted cryptographic key408. The cryptograph key identifier 406 may be in clear text (orunencrypted). Following cryptographic key identifier 406 is encryptedcryptographic key 408. Encrypted cryptographic key 408 may be 32 bytesin size and is an encrypted form of a cryptographic key. Encryptedsigning key 410 follows encrypted cryptographic key 408 and may also be32 bytes in size. Encrypted signing key 410 is an encrypted form of asigning key. In general, a signing key can be used to encrypt or sign acryptographic key, such as encrypted cryptographic key 408, for use inpublic key cryptography. Key signature 412 follows encrypted signing key410 and may also be 32 bytes in size. Generally, key signature 412 maybe used to verify or authenticate a cryptographic key, such as encryptedcryptographic key 408. In the example of FIG. 4, key signature 412 maybe in clear text. It should be appreciated that in other exampleembodiments, key packet 402 may include fewer or more fields apart fromthose fields (e.g., cryptographic key identifier 406, key signature 412,and other fields) depicted in FIG. 4. For example, key signature 412 andencrypted signing key 410 may be excluded from key packet 402.

FIG. 5 depicts a simplified diagram of a cache 206, in accordance withan example embodiment, and an example lookup of a cryptographic key fromthe cache. In this example, cache 206 is configured to store addressesA-P, key packets A-P, cryptographic keys A-P, and key signatures A-P.The addresses A-P identify locations of key packets A-P, cryptographickeys A-P, and key signatures A-P. For example, address A identifieslocations of key packet A, cryptographic key A, and key signature A. Inanother example, address G identifies locations of key packet G,cryptographic key G, and key signature G. The addresses A-P are definedby cryptographic key identifiers (not shown). For example, address A maybe defined by cryptographic key identifier A that is associated with keypacket A, cryptographic key A, and key signature A. In another example,address G may be defined by cryptographic key identifier G (not shown)that is associated with key packet G, cryptographic key G, and keysignature G.

In the example of FIG. 5, key packet 402 may be received. The key packet402 may include cryptographic key identifier 406, encryptedcryptographic key 408, encrypted signing key 410, and key signature 412.Encrypted cryptographic key 408 is an encrypted form of a particularcryptographic key. This particular cryptographic key may be stored incache 206 and may be obtained from the cache without a furtherdecryption operation to extract the cryptographic key from encryptedcryptographic key 408. This particular cryptographic key may be locatedin cache 206 through reference to cryptographic key identifier 406.Here, cryptographic key identifier 406 is extracted from or retrievedfrom key packet 402. Cryptographic key identifier 406 may then becompared with the addresses to identify a match. If a match exists, thenthe particular cryptographic key may be located at the matched address.For example, as depicted in FIG. 5, cryptographic key identifier 406matches address G. Accordingly, cryptographic key G may therefore be theparticular cryptographic key that is encrypted in encryptedcryptographic key 408. Key packet G and key signature G that are alsoassociated with cryptographic key G are also located at address G. Asexplained in more detail below, key packet G may be used to furtherverify that located cryptographic key G is associated with cryptographickey identifier 406. On the other hand, if cryptographic key identifier406 does not match any address in cache, then the cryptographic key maynot be stored in cache 206.

The addresses A-P, key packets A-P, cryptographic keys A-P, and keysignatures A-P depicted in FIG. 5 are organized in rows and columns incache 206. However, it should be appreciated that cache 206 may storeinformation in blocks. Accordingly, the key packets A-P, cryptographickeys A-P, and key signatures A-P may be organized in blocks.Furthermore, the addresses A-P may be the actual memory locations withincache 206. Such addresses may be stored in an allocation table.Alternatively, the addresses A-P may serve as an index assigned to agroup of associated information (e.g., key packet A, cryptographic keyA, and key signature A). Accordingly, such index may be stored in cache206 and referenced when locating a particular cryptographic key.

FIG. 6 depicts a simplified diagram of another example of a cache 206,in accordance with another example embodiment. Here, cache 206 isconfigured to store cryptographic key identifiers A-P and cryptographickeys A-P. Again, addresses A-P identify locations of cryptographic keyidentifiers A-P and cryptographic keys A-P. The addresses A-P aredefined by cryptographic key identifiers. As explained in more detailbelow, rather than key packets, cryptographic key identifiers A-P may beused to verify that a located cryptographic key stored in cache 206 isassociated with a cryptographic key identifier retrieved from a keypacket.

FIG. 7 depicts a flow diagram of detailed methods 700, in accordancewith an example embodiment, for locating a cryptographic key from acache. In an example embodiment, method 700 may be implemented bystorage encryption processing module 112 of FIG. 2 and employed insecurity appliance 104. As depicted in FIG. 7, a first key packet isreceived at 702. This first key packet may be received from a variety ofapplications and/or systems that need a particular cryptographic key fora cryptographic operation. Examples of applications and/or systemsinclude a storage system, a security appliance, and a storage encryptionprocessing module, which are described in detail above. This first keypacket includes a cryptographic key identifier and an encryptedcryptographic key. In addition, this first key packet may also includean encrypted signing key and a key signature.

A second key packet stored in a cache may be located at 704 using thecryptographic key identifier, which is retrieved from the first keypacket, as an address into the cache. As discussed above, the addressesstored in the cache may be defined by cryptographic key identifiers andthe second key packet may be located by comparing the cryptographic keyidentifier from the first key packet with each address. If an addressthat matches the cryptographic key identifier is found, then the secondkey packet is retrieved from the cache at 706. Similar to the first keypacket, the second key packet may also include a cryptographic keyidentifier, an encrypted cryptographic key, an encrypted signing key,and a key signature.

In an example embodiment, the first key packet is compared with thesecond key packet at 708 to determine if a match exists between thefirst and second key packets. The comparison may, for example, be abitwise comparison that compares one or more bits of the first andsecond key packets. The comparison can be made to verify that thecryptographic key stored in the cache matches the same cryptographic keyreferenced in the first key packet. For example, referring to FIG. 5, ifcryptographic key identifier 406 points to address G, then key packet Glocated at address G is retrieved from cache 206 and compared with keypacket 402.

Returning to FIG. 7, in another example embodiment, instead of comparingthe complete first and second key packets, a portion of the first keypacket may be compared with a portion of the second key packet. Theportion may include any suitable portion of the first and second keypackets (e.g., cryptographic key identifier, encrypted cryptographickey, encrypted signing key, key signature, a combination of one or morethe fields or one or more portions of the fields). For example, theportion compared may be the cryptographic key identifier portions of thefirst and second key packets because the cryptographic key identifier isa random, unique number. With reference to FIG. 6, for example, cache206 stores cryptographic key identifiers A-P and their associatedcryptographic keys A-P. If a cryptographic key identifier from areceived key packet points to address G, then cryptographic keyidentifier G located at address G is retrieved from cache 206 andcompared with the cryptographic key identifier from the key packet.

A determination is then made at 710 to identify whether the first keypacket matches the second key packet, which is described above. If amatch exists, then the cryptographic key located at the address isretrieved from the cache at 720. A cryptographic key operation may thenbe performed at 722 using the retrieved cryptographic key.

On the other hand, if the match does not exist (first key packet isdistinct from second key packet), the cache is updated to store a newcryptographic key. Here, the first key packet is validated at 712. Avariety of validation techniques may be used to validate the first keypacket. For example, a hash function may be applied to a portion of thefirst key packet and then compared with the key signature included inthe first key packet. After validation, the encrypted cryptographic keyis retrieved from the first key packet and then decrypted at 714 togenerate a decrypted cryptographic key (or cryptographic key). The firstkey packet and the decrypted cryptographic key are stored in the cacheat the address defined by the cryptographic key identifier, therebyreplacing an existing cryptographic key in the cache at the sameaddress. In effect, the first key packet and the decrypted cryptographickey replace the second key packet and a cryptographic key associatedwith the second key packet, respectively, at a location identified bythe address in the cache. As a result, the cache is updated with a newcryptographic key retrieved from the first key packet, which may bereferenced again in future cryptographic operations. Furthermore, in anexample embodiment, the key signature from the first key packet may bestored in the cache for use in a variety of cryptographic operations. Acryptographic key operation may then be performed at 718 using thedecrypted cryptographic key from the first key packet.

FIG. 8 depicts a simplified block diagram of a machine in the exampleform of a computing system (or computing device) within which a set ofinstructions, for causing the machine to perform any one or more of themethodologies discussed herein, may be executed. In alternativeembodiments, the machine may be connected (e.g., networked) to othermachines. In a networked deployment, the machine may operate in thecapacity of a server or a client machine in server-client networkenvironment, or as a peer machine in a peer-to-peer (or distributed)network environment. The machine may be a server computer, a networkswitch, a set-top box (STB), a gateway, an appliance or any suitablemachine capable of executing a set of instructions (sequential orotherwise) that specify actions to be taken by that machine. Further,while only a single machine is illustrated, the term “machine” shallalso be taken to include any collection of machines that individually orjointly execute a set (or multiple sets) of instructions to perform anyone or more of the methodologies discussed herein.

Example computing system 800 includes processor 802 (e.g., a centralprocessing unit (CPU), a graphics processing unit (GPU) or both), mainmemory 804 and static memory 806, which communicate with each other viabus 808. Computing system 800 may further include display unit 810(e.g., a liquid crystal display (LCD)). Computing system 800 alsoincludes alphanumeric input device 812 (e.g., a keyboard), userinterface (UI) navigation device 814 (e.g., a mouse), disk drive unit816, signal generation device 818 (e.g., a speaker) and networkinterface device 820.

Disk drive unit 816 includes machine-readable medium 822 on which isstored one or more sets of instructions and data structures (e.g.,software 824) embodying or utilized by any one or more of themethodologies or functions described herein. Software 824 may alsoreside, completely or at least partially, within main memory 804 and/orwithin processor 802 during execution thereof by computing system 800,with main memory 804 and processor 802 also constitutingmachine-readable, tangible media. Software 824 may further betransmitted or received over network 826 via network interface device820 utilizing any one of a number of well-known transfer protocols(e.g., Hypertext Transfer Protocol (HTTP)).

While machine-readable medium 822 is shown in an example embodiment tobe a single medium, the term “machine-readable medium” should be takento include a single medium or multiple media (e.g., a centralized ordistributed database, and/or associated caches) that store the one ormore sets of instructions. The term “machine-readable medium” shall alsobe taken to include any medium that is capable of storing, encoding orcarrying a set of instructions for execution by the machine and thatcause the machine to perform any one or more of the methodologies of thepresent application, or that is capable of storing, encoding or carryingdata structures utilized by or associated with such a set ofinstructions. The term “machine-readable medium” shall accordingly betaken to include, but not be limited to, solid-state memories, opticaland magnetic media, and carrier wave signals.

While the invention(s) is (are) described with reference to variousimplementations and exploitations, it will be understood that theseembodiments are illustrative and that the scope of the invention(s) isnot limited to them. In general, techniques for locating cryptographickey identifiers in a cache may be implemented with facilities consistentwith any hardware system or hardware systems defined herein. Manyvariations, modifications, additions, and improvements are possible.

Plural instances may be provided for components, operations orstructures described herein as a single instance. Finally, boundariesbetween various components, operations, and data stores are somewhatarbitrary, and particular operations are illustrated in the context ofspecific illustrative configurations. Other allocations of functionalityare envisioned and may fall within the scope of the invention(s). Ingeneral, structures and functionality presented as separate componentsin the exemplary configurations may be implemented as a combinedstructure or component. Similarly, structures and functionalitypresented as a single component may be implemented as separatecomponents. These and other variations, modifications, additions, andimprovements fall within the scope of the invention(s).

What is being claimed is:
 1. A method comprising: receiving a first keypacket that includes a cryptographic key identifier and an encryptedcryptographic key, wherein the first key packet also includes anencrypted signing key and a key signature; locating a second key packetstored in a cache by using the cryptographic key identifier of the firstkey packet as a memory address in the cache, wherein the second keypacket is stored at the memory address identified by the cryptographickey identifier of the first key packet; determining that the first keypacket does not match the second key packet by comparing the encryptedcryptographic key of the first key packet with an encryptedcryptographic key of the second key packet; and in response todetermining that the first key packet does not match the second keypacket, (i) validating the first key packet, (ii) decrypting theencrypted cryptographic key of the first key packet to generate adecrypted cryptographic key, (iii) storing the first key packet and thedecrypted cryptographic key in the cache, and (iv) performing acryptographic key operation using the decrypted cryptographic key. 2.The method of claim 1, wherein the cache stores a plurality of keypackets at a corresponding plurality of memory addresses.
 3. The methodof claim 2, wherein locating the second key packet stored in the cacheincludes comparing the cryptographic key identifier of the first keypacket with each memory address of the plurality of memory addresses inthe cache.
 4. The method of claim 1, wherein the cryptographic keyidentifier of the first key packet is a randomly assigned number.
 5. Themethod of claim 1, wherein the cryptographic key operation includes adecryption operation.
 6. The method of claim 1, wherein thecryptographic key operation includes an encryption operation.
 7. Anon-transitory machine readable medium having stored thereoninstructions for performing a method comprising machine executable codewhich when executed by at least one machine, causes the machine to:receive a first key packet that includes a cryptographic key identifierand an encrypted cryptographic key, wherein the first key packet alsoincludes an encrypted signing key and a key signature; locate a secondkey packet stored in a cache by using the cryptographic key identifierof the first key packet as a memory address in the cache, wherein thesecond key packet is stored at the memory address identified by thecryptographic key identifier of the first key packet; determine that thefirst key packet does not match the second key packet by comparing theencrypted cryptographic key of the first key packet with an encryptedcryptographic key of the second key packet; and in response todetermining that the first key packet does not match the second keypacket, (i) validate the first key packet, (ii) decrypt the encryptedcryptographic key of the first key packet to generate a decryptedcryptographic key, (iii) store the first key packet and the decryptedcryptographic key in the cache, and (iv) perform a cryptographic keyoperation using the decrypted cryptographic key.
 8. The non-transitorymachine readable medium of claim 7, wherein the cache stores a pluralityof key packets at a corresponding plurality of memory addresses.
 9. Thenon-transitory machine readable medium of claim 8, wherein theinstructions cause the processor to locate the second key packet storedin the cache by comparing the cryptographic key identifier of the firstkey packet with each memory address of the plurality of memory addressesin the cache.
 10. The non-transitory machine readable medium of claim 7,wherein the cryptographic key identifier of the first key packet is arandomly assigned number.
 11. The non-transitory machine readable mediumof claim 7, wherein the cryptographic key operation includes adecryption operation.
 12. The non-transitory machine readable medium ofclaim 7, wherein the cryptographic key operation includes an encryptionoperation.
 13. A computing device comprising: a memory containing amachine readable medium comprising machine executable code having storedthereon instructions for performing a method of cryptographic keyoperations; a processor coupled to the memory, the processor configuredto execute the machine executable code to cause the processor to:receive a first key packet that includes a cryptographic key identifierand an encrypted cryptographic key, wherein the first key packet alsoincludes an encrypted signing key and a key signature; locate a secondkey packet stored in a cache by using the cryptographic key identifierof the first key packet as a memory address in the cache, wherein thesecond key packet is stored at the memory address identified by thecryptographic key identifier of the first key packet; determine that thefirst key packet does not match the second key packet by comparing theencrypted cryptographic key of the first key packet with an encryptedcryptographic key of the second key packet; and in response todetermining that the first key packet does not match the second keypacket, (i) validate the first key packet, (ii) decrypt the encryptedcryptographic key of the first key packet to generate a decryptedcryptographic key, (iii) store the first key packet and the decryptedcryptographic key in the cache, and (iv) perform a cryptographic keyoperation using the decrypted cryptographic key.
 14. The computingdevice of claim 13, wherein the cache stores a plurality of key packetsat a corresponding plurality of memory addresses.
 15. The computingdevice of claim 14, wherein locating the second key packet stored in thecache includes comparing the cryptographic key identifier of the firstkey packet with each memory address of the plurality of memory addressesin the cache.
 16. The computing device of claim 13, wherein thecryptographic key identifier of the first key packet is a randomlyassigned number.
 17. The computing device of claim 13, wherein thecryptographic key operation includes a decryption operation.
 18. Thecomputing device of claim 13, wherein the cryptographic key operationincludes an encryption operation.