Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Hardware Encryption For New Computer Memory Technology
by Staff Writers
Raleigh NC (SPX) May 19, 2011


File image

Security concerns are one of the key obstacles to the adoption of new non-volatile main memory (NVMM) technology in next-generation computers, which would improve computer start times and boost memory capacity. But now researchers from North Carolina State University have developed new encryption hardware for use with NVMM to protect personal information and other data.

NVMM technologies, such as phase-change memory, hold great promise to replace conventional dynamic random access memory (DRAM) in the main memory of computers. NVMM would allow computers to start instantly, and can fit more memory into the same amount of space used by existing technologies. However, NVMM poses a security risk.

Conventional DRAM main memory does not store data once the computer is turned off. That means, for example, that it doesn't store your credit card number and password after an online shopping spree. NVMM, on the other hand, retains all user data in main memory even years after the computer is turned off. This feature could give criminals access to your personal information or other data if your laptop or smart phone were stolen. And, because the data in the NVMM is stored in main memory, it cannot be encrypted using software. Software cannot manage main memory functions, because software itself operates in main memory.

NC State researchers have developed a solution using a hardware encryption system called i-NVMM.

"We could use hardware to encrypt everything," explains Dr. Yan Solihin, associate professor of electrical and computer engineering at NC State and co-author of a paper describing i-NVMM, "but then the system would run very slowly - because it would constantly be encrypting and decrypting data.

"Instead, we developed an algorithm to detect data that is likely not needed by the processor. This allows us to keep 78 percent of main memory encrypted during typical operation, and only slows the system's performance by 3.7 percent."

The i-NVMM tool has two additional benefits as well. First, its algorithm also detects idleness. That means any data not currently in use - such as your credit card number - is automatically encrypted. This makes i-NVMM even more secure than DRAM. Second, while 78 percent of the main memory is encrypted when the computer is in use, the remaining 22 percent is encrypted when the computer is powered down.

"Basically, unless someone accesses your computer while you're using it, all of your data is protected," Solihin says.

i-NVMM relies on a self-contained encryption engine that is incorporated into a computer's memory module - and does not require changes to the computer's processors. That means it can be used with different processors and different systems.

"We're now seeking industry partners who are interested in this technology," Solihin says.

The paper, "i-NVMM: A Secure Non-Volatile Main Memory System with Incremental Encryption," will be presented June 6 at the International Symposium on Computer Architecture (ISCA) in San Jose, Calif. The paper was co-authored by Dr. Siddhartha Chhabra, a former Ph.D. student at NC State. The research was supported, in part, by the National Science Foundation.

.


Related Links
the missing link Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
White House unveils global cyberspace strategy
Washington (AFP) May 16, 2011
The White House unveiled a set of policy proposals Monday for international cooperation in ensuring an open and secure Internet. "Together, we can work together to build a future for cyberspace that is open, interoperable, secure, and reliable," US President Barack Obama wrote in an introduction to the 25-page "International Strategy for Cyberspace." Obama, who has made cybersecurity a t ... read more


CYBER WARS
A Wrinkly Old Reveal Clues To Its Past

MoonBots Challenges Teams to Conduct Lunar Missions with LEGO Robots

Earth's Nearest Neighbor Within Reach

Space Adventures proposes modified Soyuz TMA for Lunar tourists

CYBER WARS
Mars Rover Driving Leaves Distinctive Tracks

Opportunity Cracks The 18-Mile Mark

Mars Science Laboratory Aeroshell Delivered To Launch Site

Mars Express Sees Deep Fractures on Mars

CYBER WARS
NASA Denies Entry To Chinese Journalists For Shuttle Launch

NASA Announces Its First Payloads for Commercial Suborbital Spacecraft

Heaven is a 'fairy story': Hawking

Putting the Common Housefly onto the dinner plate

CYBER WARS
Top Chinese scientists honored with naming of minor planets

China sees smooth preparation for launch of unmanned module

China to attempt first space rendezvous

Countdown begins for Chineses space station program

CYBER WARS
STS-134 Arrives, Crew Begins Work at Station

APL-Built Plasma Detector Launches on Space Shuttle Endeavour

"Canary" is Bound for ISS

Utah USTAR Professor's Invention Approved by NASA for Long-Term Use Aboard ISS

CYBER WARS
Cadets Test-Fire Falcon launch Rocket

Upcoming Ariane 5 mission with GSAT-8 and ST-2 is given its "go" for launch

Preparations for third Ariane 5 mission of 2011 move into their final phase

Another Ariane 5 begins its assembly at the Spaceport

CYBER WARS
Free-Floating Planets May be More Common Than Stars

New SETI survey focuses on Kepler's top Earth-like planets

Searching for Aliens on Kepler's Planets

Study suggest water on distant planet

CYBER WARS
Amazon selling more Kindle books than print books

China slaps export quota on rare earth alloys

Physicist accelerates simulations of thin film growth

Research questions reality of supersolid in Helium-4




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement