Facebook Twitter Instagram YouTube LinkedIn
    Facebook Twitter Instagram LinkedIn YouTube
    Trending
    • Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases
    • BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles
    • Security Automation Cuts Down Expenses and Saves Time for IT Teams
    • IBM Think 2022 – Embracing the Present, Preparing for the Future
    • A Game of Numbers: The Correlation Between Technology and Sports Betting
    • Software-based Enterprise Solutions for Navigating the “Too Much Information” Age
    • A Look At The Last Generation Of Internal Combustion Engines
    • Ways to Make 2022 the Best Year Ever for Your Small Business
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • Technology
      Featured
      March 1, 20216

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 15, 2022

      A Look At The Last Generation Of Internal Combustion Engines

    • Reviews
      Featured
      March 4, 20211

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      April 7, 2022

      Dell’s Latitude 5430 Rugged – Redefining the Extremes of Mobile Computing

      October 12, 2021

      Innovating Home Video Conferencing: Dell’s New 27 Video Conferencing Monitor – S2722DZ

      September 22, 2021

      Review: Intrusion Shield

    • Podcasts
    • Security
      Featured
      March 7, 20212

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      May 14, 2022

      Ransomware is Indiscriminatory – Prepare for Everything to Fail

      May 5, 2022

      Cybersecurity Myths that are Compromising Your Data and How to Address Them

      April 14, 2022

      Digital Identities Power All Your Daily Interactions: Here’s How Identity and Access Management Works for You

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      April 8, 2022

      AI and Why Windows 12 Could Be a Far Bigger Advance than Windows 95 Was

      October 11, 2021

      The Surface Laptop Studio: Building a Windows 11 Targeted Laptop

      August 28, 2021

      Why Microsoft’s Hardware Baseline for Windows 11 Is Important

    • News & Analysis
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 20, 2022

      IBM Think 2022 – Embracing the Present, Preparing for the Future

      May 14, 2022

      Apple vs. Dell: Choosing Which Company to Work For

    • Business
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      Security Automation Cuts Down Expenses and Saves Time for IT Teams

      May 18, 2022

      Software-based Enterprise Solutions for Navigating the “Too Much Information” Age

    TechSpective
    You are at:Home»Security»Data Protection»Intel Enables Better Data Security with Crypto Acceleration
    crypto acceleration encryption Intel
    Image from Pixabay

    Intel Enables Better Data Security with Crypto Acceleration

    0
    By Tony Bradley on July 16, 2021 Data Protection, Encryption, Intel, Ransomware

    Data is essentially the “oil” or “gold” of the Internet Era. Data is crucial for both businesses and individuals—and has significant value for cybercriminals. Data needs to be protected, but that is often easier said than done. Encryption is one of the most effective and widely used methods for protecting data, but the security it provides is a function of the strength of the algorithm, and you need to have a balance between security and performance—a balance that will be even more difficult as quantum computing continues to evolve. Intel recognizes the challenges that come with encryption and is working to enable the future of computing by accelerating encryption at the hardware level.

    Encrypt Everything

    It is commonly accepted that sensitive or important data is encrypted to protect it from unauthorized access. One of the pervasive challenges of data protection, though, is who decides what is sensitive or important? And—perhaps more vitally—what is the process for continuously making that determination and actively ensuring that data is appropriately tagged and protected?

    Systems that rely on data classification almost always fail to achieve the desired goal. Someone has to be responsible for assigning the classification. If that is a central team or individual, the sheer volume of data that needs to be assessed and classified can quickly become overwhelming—leading to either significant delays, errors in classification, or both. Some organizations rely on the individual who creates the data to assign the classification, but that also often leads to errors. The net result is a system that puts a significant burden on users, and provides a false sense of security, but generally fails to adequately protect data.

    One alternative would be to encrypt everything. Remove the need to determine the value or classification of the data, and simply protect all of it. That comes with some challenges as well, though. Encrypting data—especially when using stronger, more complex algorithms—is computationally intensive. It requires a lot of processing power, and the process of encrypting and decrypting data introduces latency and impacts overall performance.

    The ultimate goal is to be able to seamlessly encrypt everything and protect all of the data, but with minimal impact to the processing capacity or performance of the system. That is where Intel’s efforts with Crypto Acceleration come in.

    Crypto Acceleration

    Intel is focused on reducing the cost of the cryptographic algorithm computations used to encrypt data. With its role as a primary provider of processors and chip hardware, Intel is on the frontline of innovations and is uniquely positioned to be able to improve encryption at the hardware level.

    Wajdi Feghali, Intel Fellow in the Intel Security, Architecture and Engineering Group, explained that the Intel’s new 3rd generation Intel Xeon Scalable processers, code-named “Ice Lake,” brings several new instructions coupled with algorithmic and software innovations. The net result is that Intel Ice Lake processors deliver cryptographic acceleration and deliver breakthrough performance for the most widely used cryptographic ciphers.

    Intel focused on improving performance for the most widely used TLS (transport layer security) ciphers. A blog post about the crypto acceleration effort explains, “Starting with the instruction set architecture (ISA), Intel introduced several enhancements designed to significantly increase cryptographic performance.”

    The Xeon Ice Lake processors include the following enhancements and capabilities to improve cryptographic performance:

    Public-Key Cryptography

    New support for “big number” multiplication. Combined with software optimization techniques, such as multi-buffer processing, the new ISA instructions provide significant performance improvements for RSA and elliptic curve cryptography.

    Symmetric Encryption

    Instruction enhancements increase performance for AES symmetric encryption, and related algorithms. The new instructions support vector processing of up to four AES blocks simultaneously, providing a performance benefit to all AES modes of encryption.

    Hashing

    Intel Ice Lake processors also boost performance for SHA (secure hash algorithm) encryption with Intel SHA Extensions. The new instructions provide a significant performance improvement for SHA-256 encryption.

    Function Stitching

    Intel pioneered the technique of function stitching—taking two encryption algorithms that typically run sequentially and “stitching” them together into a single, optimized algorithm to maximize processor resources and performance.

    Multi-Buffer

    Intel developed a capability to process multiple buffers simultaneously. It is an efficient technique that enables processing of multiple independent data buffers in parallel for cryptographic algorithms—resulting in significant performance improvements.

    Future of Computing

    The more technology evolves, the more everything is data. It’s crucial to encrypt the data that needs to be protected, but cumbersome to try and figure out and maintain which data that is. The obvious solution for the future of computing is to simply encrypt everything but doing so will require innovations like Intel has developed to enhance and accelerate cryptographic functions so that data can be encrypted and protected without affecting performance.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDelivery Drones: How Tech Can Change The Shipping Industry
    Next Article Cisco’s Global Problem Solver Challenge Winners Are Making the World a Better Place
    Tony Bradley
    • Website
    • Facebook
    • Twitter
    • LinkedIn

    I have a passion for technology and gadgets--with a focus on Microsoft and security--and a desire to help others understand how technology can affect or improve their lives. I also love spending time with my wife, 7 kids, 2 dogs, 5 cats, 1 rabbit, 2 ferrets, a pot-bellied pig, and sulcata tortoise, and I like to think I enjoy reading and golf even though I never find time for either. You can contact me directly at tony@xpective.net. For more from me, you can follow me on Twitter, Facebook, Instagram and LinkedIn.

    Related Posts

    Ransomware is Indiscriminatory – Prepare for Everything to Fail

    Cybersecurity Myths that are Compromising Your Data and How to Address Them

    Ransomware Response: 5 steps to Protect Your Business

    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Site Sponsors
    Intel
    DevOps.com
    Adobe
    PopSpective
    • Technology
    • Popular
    • Top Reviews
    May 20, 2022

    Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

    May 20, 2022

    BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    May 15, 2022

    A Look At The Last Generation Of Internal Combustion Engines

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Adobe
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    PopSpective
    Adobe
    PopSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    PopSpective

    © 2020 Xpective, Inc.

    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact
    © 2021 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.