Cryptography Does Not Equal Security


At Rambus, we often receive RFIs, RFPs and RFQs for security silicon IP cores to be used in our customer’s next semiconductor product. Such requests often contain a long shopping list of required cryptographic algorithms, their modes of operation, their key lengths or strengths and performance and sizing requirements. Depending on the target segment, additional requirements such as robustness... » read more

Averting Hacks Of PCIe Transport Using CMA/SPDM


This paper describes the component measurement and authentication (CMA) and security protocol and data model (SPDM) flow used to establish the secure channels required for the transmission of encrypted packets. The various approaches, namely the symmetric and asymmetric flows, will be discussed in establishing a secure connection with the implementation of CMA/SPDM packets through data objects.... » read more

Post-Quantum Cryptography: Safeguarding The Future Of Digital Security


As technological advancements surge forward, the specter of quantum computing looms ever larger. While the promise of quantum computers holds the potential to revolutionize fields like weather forecasting, drug discovery, and fundamental physics, it also harbors a significant threat to our current cryptographic systems. The risk is not just a future concern; any sensitive data intercepted today... » read more

Where Cryptography Is Headed


Reports began surfacing in October that Chinese researchers used a quantum computer to crack military-grade AES 256-bit encryption. Those reports turned out to be wrong, but that did little to dampen concerns about what would happen if it was true. The looming threat of quantum computers breaking today's encryption, and the stockpiling of encrypted data in preparation for a time when it can ... » read more

Better Security and Power Efficiency of Ascon HW Implementation with STT-MRAM (CEA, et al.)


A new technical paper titled "Enhancing Security and Power Efficiency of Ascon Hardware Implementation with STT-MRAM" was published by researchers at CEA, Leti, Université Grenoble Alpes, CNRS, and Spintec. Abstract "With the outstanding growth of Internet of Things (IoT) devices, security and power efficiency of integrated circuits can no longer be overlooked. Current approved standards f... » read more

Security Improving For Low-Cost Hardware


Security has been a priority in software for decades, but only recently has it begun catching up in chips — particularly those in inexpensive devices. The disconnect is that while these devices are low-cost, they often are connected to the same networks as more sophisticated devices and repositories for valuable data. It's not unusual for the entry point in ransomware or distributed denial... » read more

Addressing Quantum Computing Threats With SRAM PUFs


You’ve probably been hearing a lot lately about the quantum-computing threat to cryptography. If so, you probably also have a lot of questions about what this “quantum threat” is and how it will impact your cryptographic solutions. Let’s take a look at some of the most common questions about quantum computing and its impact on cryptography. What is a quantum computer? A quantum comput... » read more

The Importance Of Memory Encryption For Protecting Data In Use


As systems-on-chips (SoCs) become increasingly complex, security functions must grow accordingly to protect the semiconductor devices themselves and the sensitive information residing on or passing through them. While a Root of Trust security solution built into the SoCs can protect the chip and data resident therein (data at rest), many other threats exist which target interception, theft or t... » read more

Memristor Crossbar Architecture for Encryption, Decryption and More


A new technical paper titled "Tunable stochastic memristors for energy-efficient encryption and computing" was published by researchers at Seoul National University, Sandia National Laboratories, Texas A&M University and Applied Materials. Abstract "Information security and computing, two critical technological challenges for post-digital computation, pose opposing requirement... » read more

Quantum Computing Challenged By Security, Error Correction


The number and volume of warnings about a post-quantum cryptography (PQC) world are rising, as governments, banks, and other entities prepare for a rash of compromised data and untrustworthy digital signatures. Exactly when this will become a genuine threat is still somewhat fuzzy, because it depends on progress in developing robust qubits. A report by McKinsey & Co. estimates that by 20... » read more

← Older posts