A building is only as good as its foundation. The same is true for a computer architecture’s information security. Intel® Trusted Execution Technology (TXT) provides hardware-based security technologies to help build a solid foundation for security, and can play a role in meeting government and industry regulations and data protection standards.
With recent advancements in cloud computing, businesses are sending more business-critical information outside the security of their traditional IT environments than ever before. In keeping pace with such changes, Intel® AES-NI4 delivers new, affordable, and flexible encryption capabilities so you can continue to provide your customers with a variety of the latest security solutions. Learn more >
Encourage pervasive encryption by reducing the associated performance penalties with Intel® Advanced Encryption Standard New Instructions. Intel® AES-NI4 is a new encryption instruction set that gives your customers faster, more affordable data protection and greater security. Composed of seven new instructions, it improves on the widely used Advanced Encryption Standard (AES) algorithm and makes encryption feasible in areas where previously it was not.
AES is a widely deployed encryption standard when protecting network traffic, personal data, and corporate IT infrastructures, and Intel® AES-NI4 can be used to accelerate the AES encryption. This allows you to further help your customers establish flexible, robust, and affordable options to stay ahead of growing threats.
1. Testing with Oracle Database Enterprise Edition 188.8.131.52 with Transparent Data Encryption (TDE) AES-256 shows as much as a 10x speedup when inserting one million rows 30 times into an empty table on the Intel® Xeon® Processor X5680 (3.33 GHz, 36 MB RAM) using Intel IPP routines compared with the Intel® Xeon® processor X5560 (2.93 GHz, 36 MB RAM) without Intel IPP. Results have been measured by Intel based on benchmark or other data of third parties and are provided for informational purposes only. Any difference in system hardware or software design or configuration may affect actual performance. Intel does not control or audit the design or implementation of third party data referenced in this document. Intel encourages all of its customers to visit the websites of the referenced third parties or other sources to confirm whether the referenced data is accurate and reflects performance of systems available for purchase.
2. No computer system can provide absolute security under all conditions. Intel AES-NI requires an enabled Intel® processor and software optimized for use of the technology. Intel® Trusted Execution Technology (Intel® TXT) requires a computer with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules, and an Intel TXT-compatible measured launched environment (MLE). Intel® TXT also requires the system to contain a TPM v1.s. For more information, visit www.intel.com/technology/security.
4. Intel® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/
5. Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across different processor families. Go to: www.intel.co.uk/content/www/uk/en/processors/processor-numbers.html for details.
6. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.
7. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase.