Story image

Researchers develop 'world-first' adjustable security cryptoprocessor

02 Sep 2016

Secure cryptoprocessors are getting more advanced, and now there is a world-first in adjustable security, according to researchers at Okayama University and Tokyo Electron.

The secure cryptoprocessors now have the ability to adjust security levels without adjusting the processor itself.

University researchers have developed the adjustable and secure cryptoprocessor that supports both eliptic curve and pairing-based cryptographies.

The researchers say that the cryptoprocessor will have wide-ranging implications for IoT devices and 'ubiquitous terminals' because of its size and power capabilities.

This will provide scalable control, supported by cyclic vector multiplication algorithm, or CVMA. The algorithm is most commonly used for vector multiplication but also has wide uses for security scalability.

The researchers believe IoT and cloud trends will continue to need public key cryptography for security. Elliptic curve cryptography is particularly important for device and user authentication.

However, the researchers also state that computer performance is also on the increase, but that doesn't mean it's any easier to adjust device security.

They say this is because public key cryptography uses complex mathemetical problems, which can be difficult to program for security adjustment.

While traditional RSA cryptography key length has increments of 512, 1024, 2048 and 3072 bits, processors and their mathematical bases need to be upgraded.

The new secure cryptoprocessor offers security strength range from 256-5120 bits through a small circuit area size and 'practical calculation efficiency'.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.