Page 129 - Cyber Defense eMagazine February 2024
P. 129

can achieve throughput levels of up to hundreds of Gigabits per second with significantly lower energy
            consumption per cryptographic operation.



            Conclusion

            A higher security level, better performance, and lower energy consumption build trust and preference in
            hardware-based  cryptography  over  software-based  approach  in  implementation  of  security-critical
            operations, such as key management or cryptographic operations. FPGAs and ASICs are already used
            in various industrial control and automation systems. FPGA platforms combine the best of both worlds,
            as they can be re-programmed and updated for already existing applications without additional hardware,
            or  other  prohibitively  costly  investments,  while  also  offering  full  isolation  of  security-critical  data  and
            operations from the rest of the system. ASIC-based implementations offer further performance and lower
            power consumption, as well as potential cost benefits for high-volume deployments.



            About the Author

            Kimmo Järvinen is the co-founder and CTO of Xiphera.  He received the Master
            of  Science  (Tech.)  and  Doctor  of  Science  (Tech.)  degrees  from  Helsinki
            University of Technology in 2003 and 2008, respectively.

            Kimmo  Järvinen  has  a  strong  academic  background  in  cryptography  and
            cryptographic hardware engineering after having various post-doctoral, research
            fellow, and senior researcher positions in Aalto University (Espoo, Finland), KU
            Leuven (Leuven, Belgium), and University of Helsinki (Helsinki, Finland). He has
            published more than 60 scientific articles about cryptography and security engineering.

            Learn more about Xiphera.

            Learn how Xiphera executes hardware-based cryptography.






























            Cyber Defense eMagazine – February 2024 Edition                                                                                                                                                                                                          129
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   124   125   126   127   128   129   130   131   132   133   134