EDN

EDN, May 26, 2011

Issue link: http://dc.ee.ubm-us.com/i/43174

Contents of this Issue

Navigation

Page 62 of 63

EMBEDDED WITH INNOVATION: Security Making security the foundation of functionality. "AES-NI boosts AES encryption by 3x and decryption over 10x compared to pure software implementations of OpenSSL." Praveen Mosur Network Security Architect Intel® Embedded and Communications Group CHALLENGE >>> How to keep embedded devices secure without sacrifi cing performance? SOLUTION >>> Move from a "known bad" to a "known good" model of security. Instead of simply reacting to known bad signatures, wouldn't it be better to proactively shift embedded security to a "known good" model? One where you can trust the device you are communicating with? As the embedded universe continues to expand, achieving this new paradigm begins with three key elements. Authentication Quickly verifying a good signature instead of fi ltering bad ones means more resources can be devoted to focusing on the device's intended task. Which is why Intel created a true Random Number Generator that produces unpredictable random keys to help verify trusted connections. Device Integrity If your hardware isn't secured, the solution on top of it can't be trusted. A combi- nation of Intel® Virtualization Technology and Intel® Trusted Execution Technology enables a root of trust in hardware and secure isolation of critical code and data. Data Protection We need to ensure that data gets to its destination uncompromised. To make powerful encryption easier, we are adding AES new instructions (AES-NI) to our processors for up to 10-times faster crypto processing, without impacting application performance and functionality. Intel believes that security goes hand-in-hand with functionality. Which is why we're continually working on new ways to provide you with proactive security building blocks that hit the performance, power, and cost targets you expect today, with the fl exible scalability you'll need for tomorrow. Across embedded, new ideas and solutions to address security are continually emerging. From implementing secure end-to-end systems to protecting personal data to other security innovations, keep up with the critical information that is shaping the embedded landscape. READ > WATCH > DISCUSS >>> intel.com/embedded/innovation/security in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark*, and MobileMark* are measured using specifi c computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.1 Threats Report, Third Quarter 2010. 2 Symantec State of Enterprise Security Report 2010. 3 © McAfee Symantec Global Internet Security Threat Report 2010. 2011 Intel Corporation. Intel, the Intel logo, and the Intel Embedded logo are trademarks of Intel Corporation in the U.S. and/or other countries. Software and workloads used From transportation to medical devices to automated factory systems, the number of embedded devices is growing exponentially. And so are the corresponding security threats. We now live in a world with a few billion smart, connected devices and over 60,000 new malware signatures identifi ed each day.1 75 percent of enterprises surveyed by Symantec experienced some form of cyber attack in 2009.2 Threats to confi dential information that incorporated remote access capabilities grew to 98 percent in 2009.3

Articles in this issue

Links on this page

Archives of this issue

view archives of EDN - EDN, May 26, 2011