An introduction to side-channel attacks
The rapid growth of connected devices and the sensitive data they generate poses a significant challenge for manufacturers seeking to comprehensively protect their devices from attack. Indeed, consumers expect their IoT devices and data to be adequately secured against a wide range of vulnerabilities and exploits. Put simply, high levels of security must now be implemented as a primary design parameter, rather than a tertiary afterthought.
Historically, solutions that included robust encryption/decryption algorithms with cryptographic keys were considered secure. This is because brute force attacks have ultimately become computationally infeasible due to the increased key length of the cryptographic algorithm.
To read the full article, click here
Related Semiconductor IP
- RSA-ECC Public Key Accelerator Engine, 2K ops/sec, DPA Resistant
- RSA-ECC Public Key Accelerator Engine DPA Resistant, 8K ops/sec
- ICE-IP-358 High-speed XTS-GCM Multi Stream Inline Cipher Engine, DPA resistant
- HMAC-SHA-2 (224/256/384/512) 100 Million Trace DPA Resistant Crypto Accelerato
- ChaCha20 DPA Resistant Crypto Accelerator
Related Blogs
- An introduction to ARM Development Studio 5 (DS-5)
- MIPI Unipro Transport Layer (L4) - An Introduction
- MIPI MPHY "CheckMate" Verification IP - An Introduction
- The HDCP 2.2 Authentication Process - an Introduction
Latest Blogs
- RISC-V Processor Design - Free YouTube Course by Maven Silicon
- Why Secure Boot is Your Network’s Best Friend (And What BlackTech Taught Us)
- How PCIe® Technology is Connecting Disaggregated Systems for Generative AI
- Future of PQC on OpenTitan
- HiFive Premier P550 Development Boards with Ubuntu Now Available—With Great Reviews and a Lower Price