Hardware Encryption Developed for New Computer Memory Technology

Security concerns are one of the key obstacles to the adoption of new non-volatile main memory (NVMM) technology in next-generation computers, which would improve computer start times and boost memory capacity. But now researchers from North Carolina State University have developed new encryption hardware for use with NVMM to protect personal information and other data.

NVMM technologies, such as phase-change memory, hold great promise to replace conventional dynamic random access memory (DRAM) in the main memory of computers. NVMM would allow computers to start instantly, and can fit more memory into the same amount of space used by existing technologies. However, NVMM poses a security risk.

Conventional DRAM main memory does not store data once the computer is turned off. That means, for example, that it doesn’t store your credit card number and password after an online shopping spree. NVMM, on the other hand, retains all user data in main memory even years after the computer is turned off.

This feature could give criminals access to your personal information or other data if your laptop or smart phone were stolen. And, because the data in the NVMM is stored in main memory, it cannot be encrypted using software. Software cannot manage main memory functions, because software itself operates in main memory.

NC State researchers have developed a solution using a hardware encryption system called i-NVMM. Continue reading…

Related Posts

Should Truecrypt be audited? Truecrypt is a cross-platform, free disk encryption software for Windows and Unix-like operating systems. It is generally considered a good disk encry...
P4P Remodels File Sharing "Peer-to-peer" (P2P) is synonymous with piracy and bandwidth hogging on the Internet. But now, Internet service providers and content companies are ta...
Flatcar: A tool for creating Docker-ready Rails projects One of the most compelling reasons to use Ruby on Rails is the ease in which you can get a web project up and running. And one of Docker's key benefit...
Samsung Chromebook 2 will be powered by the Exynos 5 Octa processor The Samsung Chromebook 2 11.6-inch and Chromebook 2 13.3-inch models are the company's latest additions to its line of Chromebook computers. And they ...
Microsoft’s Surface RT is an “Unmitigated Disaster.” What’s wrong with that?... After Microsoft successfully used Restricted Boot to make dual-booting Linux distributions and Windows 8 on newer desktop and notebook computers a pai...
Yoga tablet is Android-powered and delivers up to 18 hours of juice The Yoga tablet computer is the latest Android-powered tablet from Lenovo. The holiday shopping season is right around the corner, so we can expect mo...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*