很抱歉,此 PDF 仅供下载

Intel AES-NI: Securing the Enterprise

Secure the Enterprise with Intel® AES-NI: White Paper

Executive Summary
Our world today has insatiable demand for technology that can find, process, and communicate information and data in business environments, as well as in our personal lives. Protection of intellectual property, personal identities, and other sensitive information is more important than ever for data on the move and at rest.

A large part of this protection is achieved through cryptography. Cryptography is the science of secret codes—transforming data from ordinary readable forms into unintelligible forms, thereby enabling the confidentiality of communication through an insecure or public/shared channel. Cryptography protects data against unauthorized parties by preventing its unauthorized use or alteration. The challenge is that traditionally, cryptography has been complex and computationally costly to execute.

Generally speaking, a cryptographic system employs a mathematical or algorithmic process to transform readable plain text to coded “cipher text” and then convert that cipher text back to plain text. The algorithms used in the encryption/decryption processes are referred to as ciphers. The operation of a cipher is often controlled by a key or a set of keys. A number of factors, such as confidentiality, integrity, authenticity, and performance determine the end-user benefits of different encryption standards.

Read the full Secure the Enterprise with Intel AES-NI White Paper.

Secure the Enterprise with Intel® AES-NI: White Paper

Executive Summary
Our world today has insatiable demand for technology that can find, process, and communicate information and data in business environments, as well as in our personal lives. Protection of intellectual property, personal identities, and other sensitive information is more important than ever for data on the move and at rest.

A large part of this protection is achieved through cryptography. Cryptography is the science of secret codes—transforming data from ordinary readable forms into unintelligible forms, thereby enabling the confidentiality of communication through an insecure or public/shared channel. Cryptography protects data against unauthorized parties by preventing its unauthorized use or alteration. The challenge is that traditionally, cryptography has been complex and computationally costly to execute.

Generally speaking, a cryptographic system employs a mathematical or algorithmic process to transform readable plain text to coded “cipher text” and then convert that cipher text back to plain text. The algorithms used in the encryption/decryption processes are referred to as ciphers. The operation of a cipher is often controlled by a key or a set of keys. A number of factors, such as confidentiality, integrity, authenticity, and performance determine the end-user benefits of different encryption standards.

Read the full Secure the Enterprise with Intel AES-NI White Paper.

相关视频