Google's Adiantum aims to bring encryption to low-end smartphones and devices

The concept will solve one of the biggest Android problems: running AES on devices with less than 1GB RAM

Adiantum

Google has unveiled its latest security measure, this time to protect lower-end devices with sufficient encryption to scramble personal data.

Known as Adiantum, the technology will work on devices that don't have the processing power to run storage encryption using Advanced Encryption Standard (AES). Such devices could be low-end smartphones, tablets, smart watches or IoT devices running on Android without the processing power of more expensive models.

Although AES encryption support is a requirement for Android devices nowadays, it's just not possible to run the security protocol on smartphones that have less than 1GB of RAM, such as those equipped with the ARM Cortex-A7. It would take up too much processing power to encrypt on the fly and result in a sluggish performance all-round.

Adiantum flips the whole concept of AES on its head. It uses HTTPS encryption via ChaCha20 stream cipher and Poly1305 Authenticator to develop a new suite of resources to encrypt data without affecting the performance of handsets with less than 1GB RAM. Using the ChaCha20 stream cipher with length-preserving encryption significantly speeds up the encryption process, with 10.6 cycles per byte on 4096-byte sectors, around 5x faster than AES-256-XTS.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"Our hope is that Adiantum will democratize encryption for all devices," Eugene Liderman, director of mobile security strategy for Google's Android security & privacy team said in a blog post. "Just like you wouldn't buy a phone without text messaging, there will be no excuse for compromising security for the sake of device performance. Everyone should have privacy and security, regardless of their phone's price tag."

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020