Creating A Modular And Versatile State-of-the-Art Cryptographic Subsystem


As the demand for secure, high-performance silicon continues to grow, chipmakers are seeking cryptographic subsystems that are not only robust and efficient but also adaptable to a wide range of use cases. Whether targeting defense electronics, automotive systems, or industrial IoT, customers are looking for solutions that deliver certified, trusted, and future-proof security capabilities. A... » read more

Side-Channel Attacks On Post-Quantum Cryptography


By Mike Hamburg and Bart Stevens Device security requires designers to secure their algorithms, not only against direct attacks on the input and output, but also against side-channel attacks. This requirement is especially notable for cryptographic algorithms, since they have a regular, well-understood structure, and the secrets they process often give access to much more information. Sid... » read more

Tailoring Root Of Trust Security Capabilities To Specific Customer Needs


The cybersecurity threat landscape is dynamic and rapidly evolving. Indeed, attackers are constantly finding new ways to exploit critical vulnerabilities across a wide range of applications and devices. Protecting data and devices requires secure processes running on systems and networks. A Root of Trust is the foundation on which all secure operations of a computing system depend. It contai... » read more

Accelerating Time To Market For The Software-Defined Vehicle With An Integrated Hardware Security Module Solution


The transformative shift towards the software-defined vehicle (SDV) continues as one of the greatest megatrends shaping the automotive industry. A new era of customer-centric mobility presents data-based revenue opportunities across the automotive value chain and ecosystem. However, this transition also presents many challenges, from managing increasingly complex hardware (HW) and software (SW)... » read more

Secure Networking With MACsec, IPsec, And TLS


As digital networks grow in complexity, securing data in transit has become a top priority. Cyber threats, ranging from man-in-the-middle attacks to large-scale data breaches, make strong encryption and authentication mechanisms essential. But network security is not a one-size-fits-all solution. Instead, it operates at different layers of the OSI model, with each layer offering unique protecti... » read more

Cryptography Does Not Equal Security


At Rambus, we often receive RFIs, RFPs and RFQs for security silicon IP cores to be used in our customer’s next semiconductor product. Such requests often contain a long shopping list of required cryptographic algorithms, their modes of operation, their key lengths or strengths and performance and sizing requirements. Depending on the target segment, additional requirements such as robustness... » read more

Enhancing Compute Security Architecture For New-Age Applications


New-age AI-powered applications are becoming increasingly essential in our daily lives. Continuing to do so requires that these applications and services meet three primary challenges: Achieving high performance for complex compute tasks. Ensuring cost-effectiveness and seamless integration with existing infrastructure. Maintaining robust security and privacy measures. Historicall... » read more

Providing Line-Rate Network Security With MACsec


Network security protocols are the primary means of securing data in motion; that is, data communicated between closely connected physical devices or between devices and even virtual machines connected using a complex, geographically distributed infrastructure. This blog will explore Media Access Control security (MACsec) and how it can be used to provide foundational level network security for... » read more

Confidential Computing: A Key To Secure Cloud And Edge Environments


Historically, data security was primarily focused on safeguarding data residing within systems controlled by the users themselves, such as on-premise storage and server infrastructure. In such a siloed environment, information stored on the storage media, Data-at-Rest, was encrypted to ensure security. Data-in-Motion (aka Data-in-Transit) was safeguarded by encrypting it before transmitting it ... » read more

Navigating Complexity And Enhancing Security In Advanced Automotive Systems


As the automotive industry advances towards higher levels of Advanced Driver Assistance Systems (ADAS), the complexity of vehicles is growing at an unprecedented rate. Modern vehicles are equipped with an increasing array of ADAS sensors, sophisticated algorithms, powerful processors, advanced in-vehicle networks, and millions of lines of software code. These components are crucial for processi... » read more

← Older posts