The 2014 Cryptographic Hardware and Embedded Systems Workshop – aka CHES – kicks off in South Korea on September 23. Sponsored by the International Association for Cryptologic Research, the event was first held in Worcester, Massachusetts in 1999 at the Worcester Polytechnic Institute (WPI).
Founded by Çetin Kaya Koç and Christof Paar, the workshop focuses on the implementation of secure cryptographic algorithms facilitated by random number generators, physical unclonable function and special-purpose cryptanalytic machines.
The Cryptography Research division of Rambus will be showcasing its DPA Workstation testing platform (DPAWS) with a revamped UI at the workshop.
Essentially, DPAWS evaluates resistance to a variety of side-channel attacks (SPA, DPA, HO-DPA and EMA) across a wide number of devices and platforms including smartphones, tablets, PoS terminals, CPUs, TVs, set-top boxes, FPGAs, smart cards and NFC tech.
According to DPAWS Product Manager Gary Kenworthy, the new DPAWS UX features a highly intuitive UI paired with enhanced data visualization.
“DPAWS now offers an integrated, project-centric analytic environment specifically designed to optimize the efficiency of side-channel analysis,” Kenworthy told Rambus Press.
“Both flexible and scalable, DPAWS easily integrates with a wide range of industry tools such as Matlab, as well as Python and other scripting languages. The DPA Workstation also supports full cipher coverage (AES, RSA, ECC, DES and SHA), large dataset handling, as well as high-speed collection and analysis of billions of traces.”
As we’ve previously discussed on Rambus Press, side-channel attacks are low-cost, non-invasive methods that enable attackers to extract secret cryptographic keys from electronic devices used during normal device operations.
DPA Countermeasures, developed by the Cryptography Research division of Rambus, offer a combination of software, hardware and protocol techniques specifically designed to protect tamper-resistant devices from side-channel attacks. These include leak reduction, incorporating randomness, generating amplitude and temporal noise, as well as executing protocol-level countermeasures.
In recent years, Rambus has licensed its DPA Countermeasure technology to multiple corporations such as Broadcom, Infineon, ST Microelectronics and Samsung.
Indeed, more than eight billion devices will be manufactured in 2014 with DPA Countermeasures licensed from the Cryptography Research (CR) division of Rambus.
Interested in learning more about how Rambus is helping to secure SoCs and devices? You can read more about our DPA countermeasures here and CryptoManager platform here.
Leave a Reply