Page 129 - Cyber Defense eMagazine February 2024
P. 129
can achieve throughput levels of up to hundreds of Gigabits per second with significantly lower energy
consumption per cryptographic operation.
Conclusion
A higher security level, better performance, and lower energy consumption build trust and preference in
hardware-based cryptography over software-based approach in implementation of security-critical
operations, such as key management or cryptographic operations. FPGAs and ASICs are already used
in various industrial control and automation systems. FPGA platforms combine the best of both worlds,
as they can be re-programmed and updated for already existing applications without additional hardware,
or other prohibitively costly investments, while also offering full isolation of security-critical data and
operations from the rest of the system. ASIC-based implementations offer further performance and lower
power consumption, as well as potential cost benefits for high-volume deployments.
About the Author
Kimmo Järvinen is the co-founder and CTO of Xiphera. He received the Master
of Science (Tech.) and Doctor of Science (Tech.) degrees from Helsinki
University of Technology in 2003 and 2008, respectively.
Kimmo Järvinen has a strong academic background in cryptography and
cryptographic hardware engineering after having various post-doctoral, research
fellow, and senior researcher positions in Aalto University (Espoo, Finland), KU
Leuven (Leuven, Belgium), and University of Helsinki (Helsinki, Finland). He has
published more than 60 scientific articles about cryptography and security engineering.
Learn more about Xiphera.
Learn how Xiphera executes hardware-based cryptography.
Cyber Defense eMagazine – February 2024 Edition 129
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.