Delivers Fast, Affordable Data Protection and Security

What Is It?

Intel® AES New Instructions (Intel® AES-NI) is a new encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data in the Intel® Xeon® processor family and the Intel® Core™ processor family.

Comprised of seven new instructions, Intel® AES-NI gives your IT environment faster, more affordable data protection, and greater security; making pervasive encryption feasible in areas where previously it was not.

Combined Value: Intel® Data Protection Technology (Intel® DPT)
with AES-NI and Secure Key

Cryptography is the foundation for data protection, and cryptography is based on: 

1. Good algorithms, i.e. AES, and 

2. Good keys, i.e. good random numbers.

Intel® AES-NI and Intel® Secure Key Instructions ›

Intel® Digital Random Number Generator (DRNG) ›

Why Intel® AES-NI Matters

Encryption is frequently recommended as the best way to secure business-critical data, and AES is the most widely used standard when protecting network traffic, personal data, and corporate IT infrastructures.

With recent advancements in cloud computing, where personal or business-critical information leaves the traditional IT environment, a more widely usable and secure encryption standard such as AES and acceleration mechanism like Intel® AES-NI are essential.

Thankfully, AES is a widely-deployed encryption standard when protecting network traffic, personal data, and corporate IT infrastructures; and Intel® AES-NI can be used to accelerate the AES encryption. With such robust, affordable, and flexible options, Intel® AES-NI can help your business stay ahead of growing threats.

By implementing some intensive sub-steps of the AES algorithm into the hardware, Intel® AES-NI strengthens and accelerates execution of the AES application.

The seven new instructions comprising Intel® AES-NI accelerate encryption and decryption and improve key generation and matrix manipulation, all while aiding in carry-less multiplication.

This minimizes application performance concerns inherent in traditional cryptographic processing and provides enhanced security by addressing side channel attacks on AES associated with traditional software methods of table look-ups.