VIA PadLock Cryptographic Service Provider utilizes real-time VIA PadLock hardware security to strengthen and accelerate security for online, desktop, embedded and mobile applications
VIA Technologies, Inc, a leading innovator and developer of silicon chip technologies and PC platform solutions, today released the VIA PadLock Cryptographic Service Provider (CSP), a software module that enables the Microsoft® Cryptographic Application Programming Interface (CryptoAPI) – used by programmers to enhance security in applications – to offload much of the security heavy-lifting to the VIA PadLock Security Engine integrated directly into VIA C7 family processors.
"The VIA PadLock CSP is a practical tool that takes full advantage of the cryptographic strength of our VIA C7 processor family to better protect users from today's security threats," said Chris Bennetts, Processor Platform Marketing, VIA Technologies, Inc. "Security is a key issue that must be addressed in order to successfully move x86 further towards convergence, and VIA has taken a proactive approach with the PadLock CSP that programmers can implement quickly and easily."
Download: VIA PadLock CSP
View: Product Overview | VIA PadLock Security Initiative
With the explosive growth of networked x86-based applications such as VoIP, video on demand and personal storage, and the escalating threat of theft of valuable information, the protection of data exchanged and stored has become of paramount importance in industrial, commercial and personal computing. Today's advanced security needs to employ multiple encryption techniques and increasingly complex algorithms to provide the ever higher levels of protection required.
The VIA PadLock CSP helps build that protection by enabling developers using the Microsoft CryptoAPI in their applications to benefit from the military-grade security tools of the VIA PadLock Security Engine with little program modification. By leveraging the cryptographic strength and power of these tools, the VIA PadLock accelerates AES ciphers by over fifty times, SHA secure hashes by seven times, and public key generation by up to two times, enabling real-time protection of information with extremely low processor utilization.