Posts tagged EETimes

Defending Against Side-Channel Attacks – Part 2

3.1 Background
As smart mobile devices become ubiquitous, many applications requiring a high degree of security are being ported to the devices. Banking, mobile payments, stock trading, and digital rights management of downloaded content are all examples of applications requiring secure connections and the use of cryptographic keys. As the examples in this section show, however, many mobile devices currently in use do not contain side-channel protections. Hence, these devices are often extremely vulnerable to side-channel attacks, often from data collection occurring several yards away.

Click here to read more…

Defending Against Side-Channel Attacks – Part I

1. Introduction 
Cryptography is a fundamental building block for securing systems and communications and is widely deployed in embedded systems used for commercial and defense applications. Basic cryptographic operations such as encryption/decryption, message-authentication and digital signatures rely on secret keys that must be kept securely within a device and protected from disclosure. Modern cryptographic algorithms, when used with appropriate-sized keys, are designed to resist all known attacks where the attacker can observe (or manipulate) the inputs or outputs of the algorithm, but does have any other information about the secret key or about the execution of the algorithm.

Click here to read more…

Startup Samples 60 GHz Transceiver

SAN JOSE, Calif. – Startup Peraso Technologies Inc. (Toronto) is sampling a 60 GHz transceiver suitable for the 802.11ad and WiGig standards. The PRS1021 can deliver up to 3.52 Gbits/second over unlicensed 57 to 66 GHz bands.

Click here to read more…

Go to Top