Cryptography Research and Invia SAS sign developer agreement for Differential Power Analysis countermeasures
- Agreement enhances ASIC and FPGA security for subscriber identification modules, smart cards, PayTV, Secure ID, digital rights management, as well as military and defense applications
"As part of our focus on delivering high-quality, tamper-resistant security blocks to our ASIC and FPGA customers, we are pleased to join the Cryptography Research DPA countermeasures developer ecosystem," said Robert Leydier, INVIA's president. "Working with CRI further strengthens the protection from major security threats we offer our semiconductor customers."
Critical Infrastructure Protection Market - Global Forecast to 2021
DPA is a form of attack that involves monitoring the fluctuating electrical power consumption of a target device and then using advanced statistical methods to derive cryptographic keys and other secrets. Strong countermeasures to DPA help protect tamper-resistant products used in applications such as military and aerospace products, smartphones and other mobile applications, banking, pay television, mass transit, secure ID, secure storage, automobiles and consumer electronics.
"DPA countermeasures are a crucial component of secure systems," said Pankaj Rohatgi, technical director, hardware security solutions at Cryptography Research. "INVIA has developed DPA-resistant hardware cores tailored to address the anti-tamper needs of our licensees, and we are pleased to have INVIA join our DPA countermeasures ecosystem."
Cryptography Research has been awarded a portfolio of over 55 patents covering countermeasures to DPA attacks, with additional patent applications pending worldwide.
Source : Cryptography Research
Nov 28 - 30, 2016 - London, United Kingdom