<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I think your understanding is in Intel® Software Guard Extensions (Intel® SGX)</title>
    <link>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121470#M1535</link>
    <description>&lt;P&gt;I think your understanding is correct.&amp;nbsp;&lt;SPAN style="font-size: 1em; line-height: 1.5;"&gt;Could you send a link to the white paper from 2013?&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 1em; line-height: 1.5;"&gt;I'd like to have a look to understand the meaning of this value called padding.&lt;/SPAN&gt;&lt;/P&gt;

&lt;P&gt;On the other hand, I don't see any reference to a padding in Table 2-23 Layout of KEYREQUEST Data Structure and Table 5-43 Key Derivation in the Programming Reference.&lt;/P&gt;</description>
    <pubDate>Fri, 25 Mar 2016 18:37:59 GMT</pubDate>
    <dc:creator>Juan_d_Intel</dc:creator>
    <dc:date>2016-03-25T18:37:59Z</dc:date>
    <item>
      <title>Offline Data Migration between Software Versions with SGX</title>
      <link>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121469#M1534</link>
      <description>&lt;P style="font-size: 13.008px; line-height: 19.512px;"&gt;I'm looking at the white paper from 2013 that describes moving data between enclave versions using a SEAL_KEY based on the MRSIGNER and ISVSVN values; however, looking at the algorithm for key derivation used by EGETKEY, there is (among other values) a value called padding in the key dependencies.&lt;/P&gt;

&lt;P style="font-size: 13.008px; line-height: 19.512px;"&gt;This value seems to be determined by the signature of the SIGSTRUCT, which itself is affected by the ENCLAVEHASH and ISVSVN values; this seems to suggest that even if I request that the SEAL_KEY be derived solely from the signing key, it will be indirectly affected by the current ENCLAVEHASH and ISVSVN, which defeats the point of trying to get a key from later versions of an enclave.&lt;/P&gt;

&lt;P style="font-size: 13.008px; line-height: 19.512px;"&gt;Am I missing something in the documentation?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2016 05:17:31 GMT</pubDate>
      <guid>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121469#M1534</guid>
      <dc:creator>Nicholas_S_2</dc:creator>
      <dc:date>2016-03-23T05:17:31Z</dc:date>
    </item>
    <item>
      <title>I think your understanding is</title>
      <link>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121470#M1535</link>
      <description>&lt;P&gt;I think your understanding is correct.&amp;nbsp;&lt;SPAN style="font-size: 1em; line-height: 1.5;"&gt;Could you send a link to the white paper from 2013?&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 1em; line-height: 1.5;"&gt;I'd like to have a look to understand the meaning of this value called padding.&lt;/SPAN&gt;&lt;/P&gt;

&lt;P&gt;On the other hand, I don't see any reference to a padding in Table 2-23 Layout of KEYREQUEST Data Structure and Table 5-43 Key Derivation in the Programming Reference.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Mar 2016 18:37:59 GMT</pubDate>
      <guid>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121470#M1535</guid>
      <dc:creator>Juan_d_Intel</dc:creator>
      <dc:date>2016-03-25T18:37:59Z</dc:date>
    </item>
    <item>
      <title>This was the white paper.</title>
      <link>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121471#M1536</link>
      <description>&lt;P&gt;This was the white paper.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://software.intel.com/en-us/articles/innovative-technology-for-cpu-based-attestation-and-sealing"&gt;https://software.intel.com/en-us/articles/innovative-technology-for-cpu-based-attestation-and-sealing&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;If you're looking at the SGX reference, it's mentioned in the key dependencies section of the EGETKEY pseudocode.&lt;/P&gt;

&lt;P&gt;&lt;IMG alt="Relevant pseudocode section" src="http://i.imgur.com/85vk9DP.jpg" /&gt;&lt;/P&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;P&gt;If you look at Table 2-2 in the reference, it mentions that the padding in the SECS is derived from the signature (presumably from the SIGSTRUCT).&lt;/P&gt;</description>
      <pubDate>Fri, 25 Mar 2016 18:47:51 GMT</pubDate>
      <guid>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121471#M1536</guid>
      <dc:creator>Nicholas_S_2</dc:creator>
      <dc:date>2016-03-25T18:47:51Z</dc:date>
    </item>
    <item>
      <title>Signature Padding is included</title>
      <link>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121472#M1537</link>
      <description>&lt;P&gt;Signature Padding is included as an additional defense against padding attacks on the SIGSTRUCT signature. The signature padding being included in SGX keys results in the key being bound to a correctly composed signature over the enclave’s SIGSTRUCT and not key that signed the contents of SIGSTRUCT [MRSIGNER] or ISVSVN.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 00:19:00 GMT</pubDate>
      <guid>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121472#M1537</guid>
      <dc:creator>Simon_J_Intel</dc:creator>
      <dc:date>2016-03-30T00:19:00Z</dc:date>
    </item>
    <item>
      <title>I see; is there a way to get</title>
      <link>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121473#M1538</link>
      <description>&lt;P&gt;I see; is there a way to get the effect described in the white paper, where you can use the extension to compute a key used by a previous version of the enclave?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 02:14:31 GMT</pubDate>
      <guid>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121473#M1538</guid>
      <dc:creator>Nicholas_S_2</dc:creator>
      <dc:date>2016-04-12T02:14:31Z</dc:date>
    </item>
    <item>
      <title>If you're working with the</title>
      <link>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121474#M1539</link>
      <description>&lt;P&gt;If you're working with the SGX SDK, you can try calling sgx_get_key, which is a wrapper to the EGETKEY instruction, and provide the enclave's previous ISV SVN value you want in the sgx_key_request_t parameter.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2016 13:21:13 GMT</pubDate>
      <guid>https://community.intel.com/t5/Intel-Software-Guard-Extensions/Offline-Data-Migration-between-Software-Versions-with-SGX/m-p/1121474#M1539</guid>
      <dc:creator>Juan_d_Intel</dc:creator>
      <dc:date>2016-04-13T13:21:13Z</dc:date>
    </item>
  </channel>
</rss>

