Hardware-based encryption is the use of
computer hardware
Computer hardware includes the physical parts of a computer, such as the central processing unit (CPU), random-access memory (RAM), motherboard, computer data storage, graphics card, sound card, and computer case. It includes external devices ...
to assist software, or sometimes replace software, in the process of data
encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
. Typically, this is implemented as part of the
processor's instruction set. For example, the
AES encryption algorithm (a modern
cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
) can be implemented using the
AES instruction set on the ubiquitous
x86 architecture
x86 (also known as 80x86 or the 8086 family) is a family of complex instruction set computer (CISC) instruction set architectures initially developed by Intel, based on the 8086 microprocessor and its 8-bit-external-bus variant, the 8088. T ...
.
Such instructions also exist on the
ARM architecture
ARM (stylised in lowercase as arm, formerly an acronym for Advanced RISC Machines and originally Acorn RISC Machine) is a family of reduced instruction set computer, RISC instruction set architectures (ISAs) for central processing unit, com ...
.
However, more unusual systems exist where the cryptography module is separate from the central processor, instead being implemented as a
coprocessor, in particular a
secure cryptoprocessor or
cryptographic accelerator, of which an example is the
IBM 4758, or its successor, the
IBM 4764.
Hardware implementations can be faster and less prone to exploitation than traditional software implementations, and furthermore can be protected against tampering.
History
Prior to the use of computer hardware, cryptography could be performed through various mechanical or
electro-mechanical means. An early example is the
Scytale used by the
Spartans.
The
Enigma machine
The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the W ...
was an electro-mechanical system cipher machine notably used by the Germans in
World War II
World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
. After
World War II
World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
, purely electronic systems were developed. In 1987 the ABYSS (A Basic Yorktown Security System) project was initiated.
The aim of this project was to protect against
software piracy
Online piracy or software piracy is the practice of downloading and distributing copyrighted works digitally without permission, such as music, movies or software.
History
Nathan Fisk traces the origins of modern online piracy back to similar ...
. However, the application of computers to cryptography in general dates back to the 1940s and
Bletchley Park
Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
, where the
Colossus computer was used to break the encryption used by German High Command during
World War II
World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
. The use of computers to ''encrypt'', however, came later. In particular, until the development of the
integrated circuit
An integrated circuit (IC), also known as a microchip or simply chip, is a set of electronic circuits, consisting of various electronic components (such as transistors, resistors, and capacitors) and their interconnections. These components a ...
, of which the first was produced in 1960, computers were impractical for encryption, since, in comparison to the portable
form factor of the
Enigma machine
The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the W ...
,
computers of the era took the space of an entire building. It was only with the development of the
microcomputer that computer encryption became feasible, outside of niche applications. The development of the
World Wide Web
The World Wide Web (WWW or simply the Web) is an information system that enables Content (media), content sharing over the Internet through user-friendly ways meant to appeal to users beyond Information technology, IT specialists and hobbyis ...
lead to the need for consumers to have access to encryption, as
online shopping
Online shopping is a form of electronic commerce which allows consumers to directly buy goods or services from a seller over the Internet using a web browser or a mobile app. Consumers find a product of interest by visiting the website of th ...
became prevalent.
The key concerns for consumers were security and speed.
This led to the eventual inclusion of the key algorithms into processors as a way of both increasing speed and security.
Implementations
In the instruction set
x86
The
X86 architecture
Architecture is the art and technique of designing and building, as distinguished from the skills associated with construction. It is both the process and the product of sketching, conceiving, planning, designing, and construction, constructi ...
, as a
CISC (Complex Instruction Set Computer) Architecture, typically implements complex
algorithms
In mathematics and computer science, an algorithm () is a finite sequence of mathematically rigorous instructions, typically used to solve a class of specific problems or to perform a computation. Algorithms are used as specifications for per ...
in hardware.
Cryptographic algorithms are no exception. The x86 architecture implements significant components of the
AES (Advanced Encryption Standard) algorithm,
which can be used by the
NSA for
Top Secret information.
The architecture also includes support for the
SHA Hashing Algorithms through the
Intel SHA extensions
A SHA instruction set is a set of extensions to the x86 and ARM architecture, ARM instruction set architecture which support hardware acceleration of Secure Hash Algorithm (SHA) family. It was specified in 2013 by Intel. Instructions for SHA-512 wa ...
.
Whereas AES is a cipher, which is useful for encrypting documents,
hashing is used for verification, such as of passwords (see
PBKDF2).
ARM
ARM processors can optionally support Security Extensions. Although ARM is a
RISC (Reduced Instruction Set Computer) architecture, there are several optional extensions specified by
ARM Holdings.
As a coprocessor
*
IBM 4758 – The predecessor to the
IBM 4764.
This includes its own specialised processor,
memory
Memory is the faculty of the mind by which data or information is encoded, stored, and retrieved when needed. It is the retention of information over time for the purpose of influencing future action. If past events could not be remembe ...
and a
Random Number Generator.
*
IBM 4764 and
IBM 4765, identical except for the connection used.
The former uses
PCI-X, while the latter uses
PCI-e.
Both are
peripheral devices that plug into the
motherboard
A motherboard, also called a mainboard, a system board, a logic board, and informally a mobo (see #Nomenclature, "Nomenclature" section), is the main printed circuit board (PCB) in general-purpose computers and other expandable systems. It ho ...
.
Proliferation
Advanced Micro Devices
Advanced Micro Devices, Inc. (AMD) is an American multinational corporation and technology company headquartered in Santa Clara, California and maintains significant operations in Austin, Texas. AMD is a Information technology, hardware and F ...
(AMD) processors are also x86 devices, and have supported the
AES instructions since the 2011
Bulldozer
A bulldozer or dozer (also called a crawler) is a large tractor equipped with a metal #Blade, blade at the front for pushing material (soil, sand, snow, rubble, or rock) during construction work. It travels most commonly on continuous tracks, ...
processor iteration.
Due to the existence of encryption instructions on modern processors provided by both
Intel
Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California, and Delaware General Corporation Law, incorporated in Delaware. Intel designs, manufactures, and sells computer compo ...
and AMD, the instructions are present on most modern computers.
They also exist on many tablets and smartphones due to their implementation in
ARM processors.
Advantages
Implementing cryptography in hardware means that part of the processor is dedicated to the task. This can lead to a large increase in speed.
In particular, modern processor architectures that support
pipelining can often perform other instructions concurrently with the execution of the encryption instruction. Furthermore, hardware can have methods of protecting data from software. Consequently, even if the
operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
is compromised, the data may still be secure (see
Software Guard Extensions).
Disadvantages
If, however, the hardware implementation is compromised, major issues arise. Malicious software can retrieve the data from the (supposedly) secure hardware – a large class of method used is the
timing attack.
This is far more problematic to solve than a software bug, even within the
operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
.
Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
regularly deals with security issues through
Windows Update. Similarly, regular security updates are released for
Mac OS X
macOS, previously OS X and originally Mac OS X, is a Unix, Unix-based operating system developed and marketed by Apple Inc., Apple since 2001. It is the current operating system for Apple's Mac (computer), Mac computers. With ...
and
Linux
Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
, as well as mobile operating systems like
iOS,
Android, and
Windows Phone. However, hardware is a different issue. Sometimes, the issue will be fixable through updates to the processor's
microcode
In processor design, microcode serves as an intermediary layer situated between the central processing unit (CPU) hardware and the programmer-visible instruction set architecture of a computer. It consists of a set of hardware-level instructions ...
(a low level type of software). However, other issues may only be resolvable through replacing the hardware, or a workaround in the operating system which mitigates the performance benefit of the hardware implementation, such as in the
Spectre exploit.
See also
*
Disk encryption hardware
*
Hardware-based full disk encryption
*
Hardware security module
References
{{Cryptography navbox , machines
Computer hardware
Cryptography