Hardware-based encryption

Hardware-based encryption
The IBM 4758 Cryptographic Module
Process typeCryptography
Industrial sector(s)Computing
Main technologies or sub-processesCryptographic hash function, Encryption

Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption. Typically, this is implemented as part of the processor's instruction set. For example, the AES encryption algorithm (a modern cipher) can be implemented using the AES instruction set on the ubiquitous x86 architecture.[1] Such instructions also exist on the ARM architecture.[2] However, more unusual systems exist where the cryptography module is separate from the central processor, instead being implemented as a coprocessor, in particular a secure cryptoprocessor or cryptographic accelerator, of which an example is the IBM 4758, or its successor, the IBM 4764.[3] Hardware implementations can be faster and less prone to exploitation than traditional software implementations, and furthermore can be protected against tampering.[4]

  1. ^ Cite error: The named reference Intel AES Instructions was invoked but never defined (see the help page).
  2. ^ Cite error: The named reference cortex cryptography was invoked but never defined (see the help page).
  3. ^ Cite error: The named reference IBM 4764 was invoked but never defined (see the help page).
  4. ^ Cite error: The named reference performance was invoked but never defined (see the help page).