Published , Modified Abstract on New Technique Offers Faster Security for Non-Volatile Memory Tech Original source
New Technique Offers Faster Security for Non-Volatile Memory Tech
Non-volatile memory technology has been around for quite some time now, and it has become an essential part of modern computing. However, the security of non-volatile memory has always been a concern. Researchers have been working on developing new techniques to improve the security of non-volatile memory, and they have recently made a breakthrough. In this article, we will discuss the new technique that offers faster security for non-volatile memory tech.
Introduction
Non-volatile memory is a type of computer memory that can retain data even when the power is turned off. It is used in various devices such as smartphones, laptops, and servers. However, non-volatile memory is vulnerable to attacks such as side-channel attacks and physical attacks. These attacks can compromise the security of the data stored in non-volatile memory.
The New Technique
Researchers from the University of California, San Diego, have developed a new technique that offers faster security for non-volatile memory tech. The technique involves using a hardware-based encryption system that encrypts data as it is written to non-volatile memory. This hardware-based encryption system is much faster than software-based encryption systems.
The researchers used a field-programmable gate array (FPGA) to implement their hardware-based encryption system. The FPGA is a type of integrated circuit that can be programmed after it has been manufactured. The researchers used the FPGA to implement an encryption algorithm called AES-XTS. This algorithm encrypts data in blocks of 16 bytes.
How It Works
The new technique works by encrypting data as it is written to non-volatile memory. When data is written to non-volatile memory, it is first encrypted using the AES-XTS algorithm. The encrypted data is then written to non-volatile memory. When data is read from non-volatile memory, it is first decrypted using the same AES-XTS algorithm. The decrypted data is then sent to the processor.
The hardware-based encryption system is much faster than software-based encryption systems because it is implemented in hardware. This means that the encryption and decryption processes are done by the FPGA, which is much faster than a software-based encryption system.
Benefits of the New Technique
The new technique offers several benefits. First, it provides faster security for non-volatile memory tech. Second, it is more secure than software-based encryption systems because it is implemented in hardware. Third, it is more efficient than software-based encryption systems because it does not require the processor to perform encryption and decryption.
Conclusion
Non-volatile memory technology has become an essential part of modern computing. However, the security of non-volatile memory has always been a concern. The new technique developed by researchers from the University of California, San Diego, offers faster security for non-volatile memory tech. The technique involves using a hardware-based encryption system that encrypts data as it is written to non-volatile memory. This hardware-based encryption system is much faster than software-based encryption systems and provides several benefits.
FAQs
1. What is non-volatile memory?
Non-volatile memory is a type of computer memory that can retain data even when the power is turned off.
2. What are side-channel attacks?
Side-channel attacks are attacks that exploit weaknesses in a system's physical properties to extract sensitive information.
3. What is an FPGA?
An FPGA is a type of integrated circuit that can be programmed after it has been manufactured.
4. What is AES-XTS?
AES-XTS is an encryption algorithm that encrypts data in blocks of 16 bytes.
5. Why is hardware-based encryption more secure than software-based encryption?
Hardware-based encryption is more secure than software-based encryption because it is implemented in hardware, which makes it harder to compromise.
This abstract is presented as an informational news item only and has not been reviewed by a subject matter professional. This abstract should not be considered medical advice. This abstract might have been generated by an artificial intelligence program. See TOS for details.
Most frequent words in this abstract:
memory (7),
non-volatile (6),
security (4)