US 12,452,220 B2
Efficient key management in distributed application
Keith D. Underwood, Powell, TN (US); and Duncan Roweth, Bristol (GB)
Assigned to Hewlett Packard Enterprise Development LP, Spring, TX (US)
Filed by Hewlett Packard Enterprise Development LP, Spring, TX (US)
Filed on Oct. 2, 2023, as Appl. No. 18/479,601.
Claims priority of provisional application 63/379,079, filed on Oct. 11, 2022.
Prior Publication US 2024/0121228 A1, Apr. 11, 2024
Int. Cl. H04L 9/40 (2022.01); H04L 1/18 (2023.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC H04L 63/0435 (2013.01) [H04L 1/18 (2013.01); H04L 9/0891 (2013.01); H04L 9/3236 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
determining, by a network interface card (NIC) of a node in a distributed system comprising a plurality of nodes, that a collective operation, which is performed by a subset of the plurality of nodes in conjunction with each other, is initiated on the node;
generating, by the NIC, a new key based on a previous key operational at the NIC;
encrypting, by the NIC, a first packet destined to another node in the distributed system based on the new key;
determining, at the NIC, which key of the new and previous keys is used to encrypt a second packet received within a duration of the collective operation;
decrypting, at the NIC, the second packet with the determined key; and
in response to determining that the collective operation has reached a threshold point, discarding the previous key.