Process type | Cryptography |
---|---|
Industrial sector(s) | Computing |
Main technologies or sub-processes | Cryptographic hash function, Encryption |
Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption. Typically, this is implemented as part of the processor's instruction set. For example, the AES encryption algorithm (a modern cipher) can be implemented using the AES instruction set on the ubiquitous x86 architecture.[1] Such instructions also exist on the ARM architecture.[2] However, more unusual systems exist where the cryptography module is separate from the central processor, instead being implemented as a coprocessor, in particular a secure cryptoprocessor or cryptographic accelerator, of which an example is the IBM 4758, or its successor, the IBM 4764.[3] Hardware implementations can be faster and less prone to exploitation than traditional software implementations, and furthermore can be protected against tampering.[4]
Intel AES Instructions
was invoked but never defined (see the help page).cortex cryptography
was invoked but never defined (see the help page).IBM 4764
was invoked but never defined (see the help page).performance
was invoked but never defined (see the help page).