{"id":32628,"date":"2017-07-21T08:40:58","date_gmt":"2017-07-21T12:40:58","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/ibm-processor-aims-to-blanket-encryption-over-everything-electronic-design.php"},"modified":"2017-07-21T08:40:58","modified_gmt":"2017-07-21T12:40:58","slug":"ibm-processor-aims-to-blanket-encryption-over-everything-electronic-design","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/ibm-processor-aims-to-blanket-encryption-over-everything-electronic-design.php","title":{"rendered":"IBM Processor Aims to Blanket Encryption Over Everything &#8211; Electronic Design"},"content":{"rendered":"<p><p>    IBM claims that its new processor can encrypt data on a massive    scale, concealing credit card payments, travel site bookings,    and government payrolls from the prying eyes of hackers.  <\/p>\n<p>    On Monday, IBM announced that the new silicon powers its latest    line of mainframes, which canautomatically keep entire    systems encrypted at all times. The z14 chipdevotes    around six billion transistors four times more than    previous z13 exclusively to encryption, which encodes    messages only decipherable with special keys.  <\/p>\n<p>    The new encryption chip runs at 5.2 gigahertz to process more    than 12 billion transactions every day ranging from ATM    withdrawals to flight reservations. Manufactured on the 14    nanometer node, it contains 10 computing cores that can encrypt    13 gigahertz of data per second. The z13 could only process    around 2.5 billion transactions every day.  <\/p>\n<p>    IBM claims that it handles encryption more cheaply and    efficiently than rival server systems, which burn through    massive amounts of computing power to encrypt and decrypt    data. The systems security prowess could be a unique    selling point for businesses that typically only encrypt    limited lumps of data.  <\/p>\n<p>    Most corporations have been slow to open their wallets for    large scale encryption. Only around 4% of all the data stolen    worldwide since 2013 was encrypted, IBM says. And only around    2% of information in corporate servers is encrypted today, as    opposed to almost 80% of mobile data, according to consulting    firm Solitaire Interglobal.  <\/p>\n<p>    The vast majority of stolen or leaked data today is open and    easy to use because encryption has been difficult and    expensive, said Ross Mauri, general manager of IBMs Z    mainframe business, in a statement. We created a data    protection engine for the cloud era to have an immediate and    significant impact on global data security.  <\/p>\n<p>    To protect encryption keys, IBM created special circuitry that    acts like dye packs hidden in bank vaults to foil robberies.    When the hardware detects malware or other intruders prying    into memory, it can throw out the keys and restore them once    the coast is clear again. IBM calls it tamper-responding    hardware.  <\/p>\n<p>    Other companies are selling chips custom hardware to expedite    cryptography in cloud servers. Intels newest Xeon Scalable processors, for    instance, encrypt and decrypt messages without having to keep    the encryption keys in memory, while Advanced Micro Devices    added a security subsystem in its Epyc server chips that    encrypt data stored within memory.  <\/p>\n<p>    The mainframe announcement comes at a particularly painful    point for IBM. On Tuesday, the company, which has been trying    to reorient the business toward cloud computing and data    analytics, reported revenues of $19.3 billion in second    quarter, down from $20.2 billion the same last year. It is    IBMs twenty-first consecutive quarter of revenue decline.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.electronicdesign.com\/embedded-revolution\/ibm-processor-aims-blanket-encryption-over-everything\" title=\"IBM Processor Aims to Blanket Encryption Over Everything - Electronic Design\">IBM Processor Aims to Blanket Encryption Over Everything - Electronic Design<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> IBM claims that its new processor can encrypt data on a massive scale, concealing credit card payments, travel site bookings, and government payrolls from the prying eyes of hackers. On Monday, IBM announced that the new silicon powers its latest line of mainframes, which canautomatically keep entire systems encrypted at all times. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32628","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32628"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32628"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32628\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}