Industry Expert Blogs
![]() |
A New FPGA Vulnerability?FPGA Gurus - Loring WirbelJul. 27, 2011 |
A team at the Horst Hortz Institute for IT Security at Ruhr University in Bochum, Germany, has just published an analysis (http://eprint.iacr.org/2011/391.pdf) of successful side-channel attacks to recover encryption keys in the Virtex-4 and Virtex-5 FPGAs from Xilinx. Similar attacks have been used against older generations of FPGAs using the Triple-DES encryption standard from the federal government, but this is the first such attack in semiconductors using the newer Advanced Encryption Standard, or AES.
Related Blogs
- Mitigating Side-Channel Attacks In Post Quantum Cryptography (PQC) With Secure-IC Solutions
- Rambus CryptoManager Root of Trust Solutions Tailor Security Capabilities to Specific Customer Needs with New Three-Tier Architecture
- Ensuring IoT Security Against Side Channel Attacks for ESP32
- Side-Channel Attacks Target Machine Learning (ML) Models
- An introduction to side-channel attacks