| Intel SSD 520 Series Solid State Drive | |
| Reviews - Featured Reviews: Storage | |
| Written by Olin Coles | |
| Monday, 06 February 2012 | |
|
Page 1 of 11
Intel SSD 520 Series Solid State Drive Review
Manufacturer: Intel Corporation Full Disclosure: The product sample used in this article has been provided by Intel. For the past several years, consumers searching through the available selection of Solid State Drive (SSD) storage devices have noticed that capacity continues to favor the hard disk drive counterpart. While it could be a few more years before any SSD matches terabyte capacity with the HDD, Intel's NAND Flash produced at 20nm is closing that gap in terms of price and storage space. In this article, Benchmark Reviews tests the Intel SSD 520 Series Solid State Drive against the leading competition to see if it's capable of delivering SATA 6 Gb/s speeds up to 550 MB/s and 80,000 maximum 4K random write IOPS. In our previous tests with the SATA 3GB/s Intel SSD 320, there was evidence of untapped potential resting within the 25nm NAND Flash components. Utilizing a unique hardware and firmware architecture, the Intel Solid-State Drive 520 Series implements on-board data compression, a feature that helps increase performance and endurance by automatically compressing data sent to the SSD. Cherryville's hardware-level compression results in data that requires less storage space, and potentially grows the capacity of the Intel SSD 520. Compressing data has other advantages, too. Intel's SSD 520 Series provides an AES 256-bit hardware-based mechanism for encryption and decryption of user data. Utilizing a 256-bit encryption key, AES encryption helps protect user data when combined with an ATA drive password. That data is further protected with end-to-end data protection by using cyclic redundancy check (CRC), parity, and error correction code (ECC) checks in the data path from the host interface to the NAND, and back.
Solid State vs Hard DiskDespite decades of design improvements, the hard disk drive (HDD) is still the slowest component of any personal computer system. Consider that modern desktop processors have a 1 ns response time (nanosecond = one billionth of one second), while system memory responds between 30-90 ns. Traditional hard drive technology utilizes magnetic spinning media, and even the fastest spinning mechanical storage products still exhibit a 9,000,000 ns / 9 ms initial response time (millisecond = one thousandth of one second). In more relevant terms, the processor receives the command and must then wait for system memory to fetch related data from the storage drive. This is why any computer system is only as fast as the slowest component in the data chain; usually the hard drive. In a perfect world all of the components operate at the same speed. Until that day comes, the real-world goal for achieving optimal performance is for system memory to operate as quickly as the central processor and then for the storage drive to operate as fast as memory. With present-day technology this is an impossible task, so enthusiasts try to close the speed gaps between components as much as possible. Although system memory is up to 90x (9000%) slower than most processors, consider then that the hard drive is an added 1000x (100,000%) slower than that same memory. Essentially, these three components are as different in speed as walking is to driving and flying. Solid State Drive technology bridges the largest gap in these response times. The difference a SSD makes to operational response times and program speeds is dramatic, and takes the storage drive from a slow 'walking' speed to a much faster 'driving' speed. Solid State Drive technology improves initial response times by more than 450x (45,000%) for applications and Operating System software, when compared to their mechanical HDD counterparts. The biggest mistake PC hardware enthusiasts make with regard to SSD technology is grading them based on bandwidth speed. File transfer speeds are important, but only so long as the operational IOPS performance can sustain that bandwidth under load. Bandwidth Speed vs Operational PerformanceAs we've explained in our SSD Benchmark Tests: SATA IDE vs AHCI Mode guide, Solid State Drive performance revolves around two dynamics: bandwidth speed (MB/s) and operational performance (IOPS). These two metrics work together, but one is more important than the other. Consider this analogy: bandwidth determines how much cargo a ship can transport in one voyage, and operational IOPS performance is how fast the ship moves. By understanding this and applying it to SSD storage, there is a clear importance set on each variable depending on the task at hand. For casual users, especially those with laptop or desktop computers that have been upgraded to use an SSD, the naturally quick response time is enough to automatically improve the user experience. Bandwidth speed is important, but only to the extent that operational performance meets the minimum needs of the system. If an SSD has a very high bandwidth speed but a low operational performance, it will take longer to load applications and boot the computer into Windows than if the SSD offered a higher IOPS performance.
|
|





Comments
While these drives are appreciably more expensive than equally performing models from other companies, one would hope that a lot more testing and quality controls went into making them, and there's no way to test for reliability between brands in a review like this, you need to run tests for a long period of time using large numbers of drives and the expense and time of such an undertaking would be beyond the capabilities of a review site.
I am concerned with the 520's reliance on the bios password for encryption. Isn't the bios password fairly easy to hack? If my laptop 'walks off' is my data really 100% secure or is it readily available to anyone who can garner the bios password?
Although I do not use it personally, it is my understanding that TrueCrypt works perfectly on an SSD.
I think the origin for this mixup is comming from the first sandforce controlled SSDs - they encrypted the data on the memory chips, but users had no way to enter a password since ATA HD security was not supported. back then it was no security enhancement at all. encryption was just used as a cheap way to randomly scatter data over the NAND as a wear leveling tool.
Setting up a ATA HD password with a selfencrypting ssd like the intel 520 series will securly encrypt all data and you wont be able to read or write to the drive without the password. the drive cannot be pluged into another computer and be accessed there. It will show up as a locked drive until you enter the correct ATA master- or user password. you wont even be able to secure erase the drive without a password - better don't loose it or you have to dump your drive. However, your mainburd has to support ATA HD security. That is a still little hard to find...
this is also not what the article you reffere to (SandForce SSD Encryption - Demystified) is stating. the articel you reffered to was mainly questioning the security of such a "black box" solution in spite of an open source solution like truecrypt. The article is also quite old.
to get a clearer view of how it actually works see the document:
##hgst.com/tech/techlib.nsf/techdocs/F08FCD6C41A7A3FF8625735400620E6A/$file/HowToGuide_BulkDataE ncryption_final.pdf
It seems to be just a logical step to use ondisk encryption whenever possible with a SSD since SSDs loose up to 80% performance if you use truecrypt.
@Bill: Yes, ATA HD encryption is sufficient for personal or corporate use.
Best
Bjoern
From your comments, my understanding is that if my motherboard supports ATA Security, I can set a password that is unrelated to the BiOS password and is not stored in the BIOS. Correct?
One other question, if my motherboard does NOT support ATA Security, can the Intel toolkit be used to set the SSD ATA password? Do I then continue to use the toolkit to provide the password and enable access?
1.) Yes. The PW will be hashed and the hash will be saved in the drive. the PW can then be used to decrypted the key used for the encryption of the data on the drive itself. You can also use the drive in another computer supporting ATA security - at least if it is the same mainboard and therefore BIOS implementation of ATA security.
2.) If your BIOS does not support ATA security there is no way to use a password protected disk. the disk would be locked - without a supporting BIOS you cannot enter the password. Most systems would not even boot with a locked drive on any SATA channel. that is also the reason why you cannot set the password using the intel toolkit. imagin you would set a password in windows and then be unable to access your system anymore, because your bios actualy does not support it.
Therefore, the entire handling of the password is quite uncomfortable and you have a risk of loosing your hardware. allways remember - if you loose the password you loose not only the data but also the drive itself. It would be bricked forever.