Page 127 - Cyber Defense eMagazine February 2024
P. 127

Why Is Hardware More Secure than Software?


            The  underlying  differences  between  hardware  and  software  when  implementing  critical
            cryptosystems.

            By Kimmo Järvinen, Co-founder and CTO, Xiphera


            The  majority  of  today’s  cryptographic  implementations  rely  on  software  running  on  general-purpose
            processors. While this method is a practical and justified approach for many applications, software-based
            cryptography  has  inherent  weaknesses  when  it  comes  to  safeguarding  of  critical  systems  and
            applications.

            Cryptography designed directly into hardware, especially on field programmable gate arrays (FPGAs) or
            application  specific  integrated  circuits  (ASICs),  solves  many  weaknesses  of  software-based
            cryptography, offering superior security and efficiency compared to software-based security approach.
            This article scrutinizes the weaknesses of software-based cryptography and explores the advantages of
            the  hardware-based  alternatives  in  protecting  essential  systems,  such  as  industrial  control  and
            automation systems, as well as critical communication infrastructure.










            Cyber Defense eMagazine – February 2024 Edition                                                                                                                                                                                                          127
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   122   123   124   125   126   127   128   129   130   131   132