encryption

Intel® Xeon® Processor E5-2600 v3 Accelerates Hadoop HDFS Encryption

The latest Intel® Xeon® processor with embedded Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI) and the latest Cloudera distribution of Hadoop accelerate Big Data encryption.

Download cloudera-aes-ni.pdf

  • Developers
  • Server
  • Intel® AES-NI
  • cloudera
  • hadoop
  • Advanced Encryption Standard (AES)
  • encryption
  • Big Data
  • Data Center
  • Enterprise
  • Security
  • How Intel® QuickAssist Technology Accelerates Deep Packet Inspections and other Network Function Use Cases

    Intel® QuickAssist Technology Introduction

    Intel® QuickAssist Technology accelerates and compresses cryptographic workloads by offloading the data to hardware capable of optimizing those functions.  This makes it easier for developers to integrate built-in cryptographic accelerators into network and security applications.

    Sample Application: Data Encryption

    Abstract 
    This is a sample application that shows how to create a Windows 8 store style application that encrypts the data on your device.  It uses the new Windows 8 Runtime Crypto APIs and it is written in JavaScript.  This application asks users to select file (video, picture, etc.) and encrypt the selected file using AES encryption algorithm.  

  • Developers
  • Microsoft Windows* 8.x
  • Windows*
  • JavaScript*
  • WindowsCodeSample
  • windows
  • store
  • runtime
  • crypto
  • APIs
  • encryption
  • Microsoft Windows* 8 Style UI
  • Touch Interfaces
  • AES-NI in Laymen's Terms

    What is AES-NI - first answer
    AES-NI are a set of six new instructions introduced by Intel when we introduced the new 2010 Intel® Core™ processor family code named Westmere. AES-NI stands for Advanced Encryption Standard - New Instructions. These instructions implement hardware accelerated versions of certain compute intensive steps used in the AES (RijnDael) algorithm.

    Okay - so what is the Advanced Encryption Standard (AES)?

    Using a Service Gateway to Protect against the OWASP Top 10

    The Open Web Application Security Project (OWASP) maintains and publishes an oingoing list of top ten threats to web applications. With some of exceptions, the threats listed in the OWASP top ten can be applicable to any service, be it a web application, REST service, SOAP service or custom application. It is interesting to note that while there are changes to the bottom five threats, the top five threats remain unchanged since 2007.

    Subscribe to encryption