US 12,088,713 B2
Dynamic selection and calibration of ciphers based on network and resource constraints
Daniel James Beveridge, Apollo Beach, FL (US); Mark Benson, Workingham (GB); Marc Wayne Brotherson, Boulder, CO (US); Sean Huntley, NSW (AU); Akeem Jenkins, Broomfield, CO (US); and David Ott, Chandler, AZ (US)
Assigned to VMware LLC, Palo Alto, CA (US)
Filed by VMware LLC, Palo Alto, CA (US)
Filed on Jul. 26, 2021, as Appl. No. 17/385,287.
Prior Publication US 2023/0026253 A1, Jan. 26, 2023
Int. Cl. H04L 9/14 (2006.01)
CPC H04L 9/14 (2013.01) 20 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, at a cryptographic agility system and from an application, via an application programming interface (API), a request related to a cryptographic operation, wherein the request is associated with a computing device, the request comprising one or more of:
a set of data to be encrypted; or
contextual information related to the request;
determining, with the cryptographic agility system, one or more resource constraints related to the computing device;
selecting, with the cryptographic agility system and based at least in part on the one or more resource constraints, a cryptographic technique from a plurality of cryptographic techniques associated with indications of resource requirements for each of the plurality of cryptographic techniques; and
providing, from the cryptographic agility system and to the application, via the API, a response to the request, the response comprising at least one of:
data encrypted by the selected cryptographic technique; or
information related to performing the selected cryptographic technique to encrypt the data on the computing device.