What is one advantage of hardware-based encryption over software-based encryption mentioned in the slides?