Industry Expert Blogs
An introduction to side-channel attacksRambus BlogMay. 28, 2018 |
The rapid growth of connected devices and the sensitive data they generate poses a significant challenge for manufacturers seeking to comprehensively protect their devices from attack. Indeed, consumers expect their IoT devices and data to be adequately secured against a wide range of vulnerabilities and exploits. Put simply, high levels of security must now be implemented as a primary design parameter, rather than a tertiary afterthought.
Historically, solutions that included robust encryption/decryption algorithms with cryptographic keys were considered secure. This is because brute force attacks have ultimately become computationally infeasible due to the increased key length of the cryptographic algorithm.
Related Blogs
- Mitigating Side-Channel Attacks In Post Quantum Cryptography (PQC) With Secure-IC Solutions
- Thales e-Security's Countermeasure Validation Certification
- Intel Embraces the RISC-V Ecosystem: Implications as the Other Shoe Drops
- QuiddiKey: A Single Cryptographic Solution for the Lifecycle of a Connected Device
- Why Choose Hard IP for Embedded FPGA in Aerospace and Defense Applications