9.3 Hardware Implementations for Data Security