sb-as logo
Story image

Researchers develop 'world-first' adjustable security cryptoprocessor

02 Sep 2016

Secure cryptoprocessors are getting more advanced, and now there is a world-first in adjustable security, according to researchers at Okayama University and Tokyo Electron.

The secure cryptoprocessors now have the ability to adjust security levels without adjusting the processor itself.

University researchers have developed the adjustable and secure cryptoprocessor that supports both eliptic curve and pairing-based cryptographies.

The researchers say that the cryptoprocessor will have wide-ranging implications for IoT devices and 'ubiquitous terminals' because of its size and power capabilities.

This will provide scalable control, supported by cyclic vector multiplication algorithm, or CVMA. The algorithm is most commonly used for vector multiplication but also has wide uses for security scalability.

The researchers believe IoT and cloud trends will continue to need public key cryptography for security. Elliptic curve cryptography is particularly important for device and user authentication.

However, the researchers also state that computer performance is also on the increase, but that doesn't mean it's any easier to adjust device security.

They say this is because public key cryptography uses complex mathemetical problems, which can be difficult to program for security adjustment.

While traditional RSA cryptography key length has increments of 512, 1024, 2048 and 3072 bits, processors and their mathematical bases need to be upgraded.

The new secure cryptoprocessor offers security strength range from 256-5120 bits through a small circuit area size and 'practical calculation efficiency'.

Story image
Financial institutions in APAC region to invest millions in fraud prevention
"The pandemic is creating a lot of uncertainty, but the majority of FIs in APAC recognise that an end to end fraud management platform is strategic to differentiating themselves from the highly disruptive landscape they are playing in."More
Story image
Google Cloud observes spike in DDoS volumes in last two years
Google Cloud has seen an ‘exponential’ rise in distributed denial of service (DDoS) attacks over the past decade, but the biggest attacks have only occurred in the past couple of years.More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
BlueVoyant acquires Managed Sentinel, builds out Microsoft MSS offerings
“Combining Managed Sentinel’s Azure Sentinel deployment expertise with BlueVoyant’s MDR capabilities will help customers operationalise and maximise Microsoft security technologies."More
Story image
Experiencing ransomware significantly impacts cybersecurity approach
"The survey findings illustrate clearly the impact of these near-impossible demands. Among other things, those hit by ransomware were found to have severely undermined confidence in their own cyber threat awareness."More
Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More