NXP warns cryptographic keys can be hacked
Richard Wilson, Electronics Weekly
July 14, 2016
An encrypted key technology used to make hardware like mobile phones secure may not be as hackable as first thought.
A team of researchers from semiconductor developer NXP have shown that in fact it can be much easier than thought to extract the keys from a white-box environment.
Cryptographic keys protected by white-box software implementations are traditionally regarded as the best form of security. Keys can only to be extracted from white-box implementations by time-consuming reverse-engineering effort and complicated algebraic attacks.
To read the full article, click here
Related Semiconductor IP
- APB Post-Quantum Cryptography Accelerator IP Core
- Elliptic Curve Cryptography IP
- Tunable Cryptography solutions with embedded side-channel protections: AES - SHA2 - SHA3 - PKC - RSA - ECC - Crystals Kyber - Crystals Dilithium - XMSS - LMS - SM2 - SM3 - SM4 - Whirlpool - CHACHA20 - Poly1305
- Crypto Coprocessor with integrated Post-Quantum Cryptography IPs
- Post-Quantum Cryptography Processor
Related News
- NXP: 'We Need to Be More Chinese'
- Floadia Raises 1.2 Billion Yen to Develop New Memory Technology That Can Be Disruptor in AI Edge Computing
- Safety element for automobiles, production or health can be implemented on the own microcontroller chip: RISC-V processor AIRISC-SAFETY from Fraunhofer Institute for Microelectronic Circuits and Systems IMS
- Synopsys PUFs Create Cryptographic Keys That Never Get Stored
Latest News
- Intel facing another crossroads: 18A or 14A process node
- Creonic Successfully Renewed its ISO 9001:2015 Certification
- Silvaco Strengthens Leadership Team with Three Industry Veterans to Drive Innovation and Growth
- JFE Shoji Electronics Signs Sales Agent Agreement with Andes Technology
- Mixel Supports Automotive SerDes Alliance (ASA) Motion Link SerDes IP