Crypto Wiki
This article does not cite any sources. Please help improve this article by adding citations to reliable sources. (February 2009)


Adaptive multithreaded encryption (AME) refers to the technology of splitting data cryptography activity into several concurrent tracks where the processing is accomplished on two or more processors according to the number of actually available processors. Primarily, this technology is most applicable to modern data storage systems that encrypt data before it is written to the storage media and decrypt it when the data is retrieved. However, use of AME could be beneficial in other applications, such as cryptosystems that secure data communications over wired and wireless networks.[1][2]


One of the pioneers of adaptive multithreaded encryption, Alexey Raevsky, has been developing leading-edge security protocols for more than 15 years and is currently working on his doctoral thesis detailing the methodology and benefits of an AME computing environment. He has filed for patent protection for this technology.

Raevsky is currently CEO of Zecurion, a data and device security company in Russia. Zecurion [1] has developed the only data security solution that utilizes AME at the storage media level.

Richard Stiennon is a veteran of the security industry and an industry analyst who writes for Networkworld and maintains the Threat Chaos blog focusing on security issues. In a recent article, More Better Encryption he talks about how AME will help help make the data encryption process more efficient and secure for enterprise networks.

Robin Bloor, a partner of Hurwitz & Associates, has over 25 years experience in software development and IT analysis and consulting. Robin is an influential and respected researcher and commentator on many corporate IT issues and strategies. His recent research has focused on virtualization, SOA, business intelligence, security, workload automation, communications enabled business processes, and the evolution of software tools. In a recent article Robin discusses the nature of the internal threat and how adaptive multithreaded encryption can be used to combat these most common of all data breaches.

Recent research from the Ponemon Institute examines the cost of data breaches based on estimated and reported losses from 43 organizations in 2008, while the Open Security Foundation reports a 225% increase in data loss incidents since 2000 in this 2008 year-end report.

See also[]

  • Barrier Synchronization – method of providing synchronization of processes in a multiprocessor system by establishing a stop (“wait”) point
  • Cipher – a pair of algorithms that are applied to encrypt and decrypt information
  • Cryptography – the practice and study of hiding information using a cipher
  • Decryption – the process of converting unintelligible cipher-text to plain-text
  • Encryption - the process of converting plaintext to unintelligible cipher-text


  2. 1. Predicting the CPU availability of time-shared UNIX systems. Rich Wolski, Neil Spring, Jim Hayes. UCSD Technical Report Number CS98-602. October 16, 1998.