Google's Adiantum aims to bring encryption to low-end smartphones and devices

The concept will solve one of the biggest Android problems: running AES on devices with less than 1GB RAM


Google has unveiled its latest security measure, this time to protect lower-end devices with sufficient encryption to scramble personal data.

Known as Adiantum, the technology will work on devices that don't have the processing power to run storage encryption using Advanced Encryption Standard (AES). Such devices could be low-end smartphones, tablets, smart watches or IoT devices running on Android without the processing power of more expensive models.

Although AES encryption support is a requirement for Android devices nowadays, it's just not possible to run the security protocol on smartphones that have less than 1GB of RAM, such as those equipped with the ARM Cortex-A7. It would take up too much processing power to encrypt on the fly and result in a sluggish performance all-round.

Adiantum flips the whole concept of AES on its head. It uses HTTPS encryption via ChaCha20 stream cipher and Poly1305 Authenticator to develop a new suite of resources to encrypt data without affecting the performance of handsets with less than 1GB RAM. Using the ChaCha20 stream cipher with length-preserving encryption significantly speeds up the encryption process, with 10.6 cycles per byte on 4096-byte sectors, around 5x faster than AES-256-XTS.

Advertisement - Article continues below

"Our hope is that Adiantum will democratize encryption for all devices," Eugene Liderman, director of mobile security strategy for Google's Android security & privacy team said in a blog post. "Just like you wouldn't buy a phone without text messaging, there will be no excuse for compromising security for the sake of device performance. Everyone should have privacy and security, regardless of their phone's price tag."

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now

Most Popular

Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019

Five signs that it’s time to retire IT kit

29 Nov 2019