We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
74,943 News Articles

Memory encryption breakthrough claimed by NC State researchers

Researchers at North Carolina State University claim they've achieved a breakthrough in how encryption can be used in technology called non-volatile main memory, which is seen as an eventual replacement for conventional dynamic random-access memory.

Unlike DRAM, with NVMM "when you turn off the power, the data remains there," Yan Solihin, associate professor of electrical and computing engineering at N.C. State, explains. He notes: "The advantage of that is clear -- that's an advantage because it gives you an instant-on experience." But the downside in terms of security is that the user's application data, even as much as 4GB worth, "doesn't disappear from main memory. So if your computer is stolen, someone could easily read out the content of main memory."

IN DEPTH: What's up with encryption?

In work conducted with graduate students, Solihin says N.C. State researchers completed building a hardware-based method to self- encrypt NVMM data. The idea is it might eventually become integrated into chipsets.

"We add an encryption engine to the memory module to encrypt to memory," Solihin says.

While software-based encryption has been offered before for NVMM, he believes this is likely the first hardware-based approach to the NVMM question. Encryption is known to greatly slow performance but under some conditions, where just 80% of memory storage is encrypted, there's only a 3% performance hit with the N.C. State approach. The remaining 20% is encrypted at power-down, he says. In contrast, it's not unusual to see a 50% slowdown due to encryption, he adds. The N.C. State project relies on the Advanced Encryption Standard (AES).

Solihin says N.C. State is now looking toward how to commercialize its hardware-based encryption approach to NVMM by working with industry, where the hardware-based encryption could also find use in smartphones and other mobile devices.

Read more about wide area network in Network World's Wide Area Network section.

IDG UK Sites

iPhone 5s review: why the iPhone 5s is still the best phone you can buy in 2014

IDG UK Sites

PCs vs consoles: PCs still pwn when it comes to gaming (and everything else)

IDG UK Sites

Come together to learn: the secrets of the best design talks, conferences and courses