How Does Hardware Encryption Work