Serving the Critical Data Storage Needs
of Industrial and OEM Customers

FORTASA BLOG

Flash Storage Solutions for Embedded Designs
High Reliability Flash SSDs, Cards and Modules for Industrial Applications

How Hardware-Based Encryption is Implemented in SSDs

Posted by Biraj Jamalayam on Wednesday, 26 Nov 2025

How SSDs Use Hardware-Based Encryption

SSDs store data in NAND flash memory.  Too increase Flash Memory reliability, SSDs utilize wear leveling which spreads the memory usage accross the whole address space. This design makes it difficult to completely and efficiently erase  stored data using software alone. To address this problem, most modern SSDs integrate built-in hardware encryption.

Benefits of Hardware Encryption

• No performance slowdown since a dedicated Encryption Engine inside the Flash Controller handles encryption instead of the main CPU.
• All data is encrypted automatically and on-the-fly, including temporary and hidden files.
• Encryption keys stay inside the drive, making the system resistant to OS-level malware.
• Completely independent on System OS, works on any operating system.

How Hardware AES Operates

Encrypted SSDs use two main keys:

1. Encryption Key (EK)

• Randomly assigned 128-bit or 256-bit AES key.
• Encrypts all data written to the NAND.
• Stored only inside the drive in encrypted form, no user access to this key

2. Authorization Key (AK)

• Set by the user.
• Locks and unlocks the drive.
• On OPAL 2.0 SSDs, the AK encrypts the EK and secures the drive.

Authentication Process

  1. The system boots and loads a secure pre-boot environment.
  2. The user enters a password or biometric credential.
  3. A Key Deriving Function transforms these credentials into the Authorization Key.
  4. If the AK matches, the drive unlocks.
  5. The EK is decrypted and loaded into the SSD’s crypto engine.
  6. The operating system begins loading normally.

 

Managing Encrypted SSDs

ATA Security

• Managed through the BIOS.
• Setting an ATA password creates the Authorization Key.
• Allows cryptographic erase through key updates.

TCG OPAL 2.0

• The industry standard for advanced drive security.
• Supports a 128 MB pre-boot environment for biometrics, TPM, or network authentication.
• Allows separate protected regions on the same drive, each with its own key.
• Supports centralized management and remote sanitization.

READ MORE

Integrating Encryption in SSDs

Posted by Biraj Jamalayam on Tuesday, 25 Nov 2025

Encryption and Security Development in Solid State Drives (SSDs)

This article explains how modern Solid State Drives protect data through advanced encryption and dedicated security technology.

Encrypted Fortasa SSD

 


Understanding Data Encryption

Data encryption transforms readable information called plaintext into scrambled data called ciphertext. Without the proper decryption key, the information is useless. Decryption reverses this process and requires a secret key, and often a password. When encryption works alongside secure protocols, it forms one of the strongest defenses for sensitive information.

Types of Encryption

1. Symmetric Encryption

• Uses one key for both encryption and decryption.
• The same key must be shared by both sender and receiver.
• Example: AES.

2. Asymmetric Encryption

• Uses a public key to encrypt and a private key to decrypt.
• The public key can be shared freely.
• Only the intended recipient has the private key needed to open the data.
• Example: When your phone sends encrypted information to a bank server.

Both categories protect data in transit and data stored on devices. When used on SSDs, encryption keeps information safe even if the physical drive is lost or stolen.


Common Encryption Algorithms

Advanced Encryption Standard (AES)

• Symmetric block cipher.
• Used by the U.S. government for classified data.
• Works on 128-bit blocks.
• Versions include AES-128, AES-192, and AES-256.
• Higher key length means more rounds of encryption and stronger protection.

Triple Data Encryption Standard (3DES)

• Symmetric cipher that evolved from DES.
• Encrypts data three times using three 56-bit keys.
• Much slower than AES and being phased out, though still used in some financial systems.

RSA

• Asymmetric public-key algorithm.
• Security comes from the difficulty of factoring large prime-based numbers.
• Often uses 1024-bit or 2048-bit keys.
• Strong but slower than AES.

 

READ MORE

OVERCOMiNG WRITE AMPLIFICATION IN SSDs

Posted by David Chen on Wednesday, 01 Mar 2023

Embedded computing systems are designed to be highly efficient and effective, allowing them to perform specific tasks such as rapidly writing data to storage media quickly and accurately. While hard disk drives (HDDs) remain a viable storage option, especially where large amounts of data need to be written, their mechanical components can be vulnerable to damage from environmental influences such as shock and vibration in industrial settings, resulting in higher error rates. Consequently, Solid State Drives (SSDs) are most often preferred in rugged industrial storage settings because they lack moving parts and can withstand environmental impact much better than HDDs.

However, the biggest drawback of using Flash Memory Based Storage Solutions or SSDs is that flash memory storage has a finite lifespan based on the number of program and erase cycles written to the media. And write amplification can significantly shorten this lifespan.

Write amplification is a phenomenon the occurs when flash memory and solid state drives (SSDs) store more data than was originally intended, leading to an more write/erase cycles that compromise the device's lifespan and performance. To measure write amplification, it is necessary to compare the amount of data written to the flash memory with the amount intended to be stored by the application's host system. When compared to HDDs, SSDs are more susceptible to write amplification, as they require data to be erased before new data can be written, whereas HDDs permit new data to be written over old data. To understand why and how write amplification occurs in SSDs, it is essential to understand how they store data.

READ MORE

SSD OVERHEATING ISSUE REQUIRES THERMAL THROTTLING

Posted by Samuel Nakhimovsky on Tuesday, 07 Jul 2020

Solid-state drives (SSDs) are a type of data storage device that use a non-volatile semiconductor-based memory, such as a flash memory, to store data. As market demand for high capacity storage drives higher and higher SSD capacity, performance demands increase respectively. To achieve an increase in SSD performance, multiple storage components need to be addressed simultaneously, increasing the power usage by the SSD. At the same time, the physical size requirements of the SSD generally stay the same or become even smaller.

When SSDs are subjected to sustained workloads from peak performance sequential writes over a long period of time, the drives tend to internally heat up. If and when the SSD temperature exceeds that of the rated operating conditions, the NAND Flash components start to "leak" electrons and data errors are very likely to occur. In addition, to compound the problem, SSDs used in industrial applications must be able to tolerate higher ambient temperatures, which naturally hinders heat dissipation. This temperature increase can potentially put data stored on the SSD at the risk of being corrupted and hardware components in danger of being permanently damaged, both of which, naturally, lead to significant reduction in the life expectancy of the drive.

Here is a chart for SSD continuous operation without any cooling techniques.

READ MORE

Page