New Encryption Mode Brings Sincerity and Discretion to Low-Cost Android Devices
Adantium, developed by Google, brings communication encryption to bear on storage security.
Android devices come in a wide range of CPU power and memory configurations. Until recently, those on the lower end of the range weren't required to offer encrypted storage. The reason? The most common encryption scheme, AES256, requires too much from the CPU: The device's performance would have become unacceptably slow.
Now engineers at Google have developed a technique based on an encryption technique used in browser security and named for the maidenhair fern (denoting sincerity and discretion) to bring secure storage to these less expensive devices without bringing apps to a standstill.
The new encryption mode, called Adantium, uses the ChaCha stream cipher adapted from HTTPS encryption. The stream cipher is faster on lower-powered devices because its operation is based on the additions, rotations, and XORs available on every CPU; it doesn't require the built-in encryption primitives common on higher-powered processors.
ChaCha20 has been the basis for Google's HTTPs encryption since 2014, so its engineers have experience with the protocol and a high degree of certainty that using it for disk or file encryption will be both fast and secure. A paper on the implementation, Adiantum: length-preserving encryption for entry-level processors, will be presented at the Fast Software Encryption conference (FSE 2019) in March.
Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.
About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024