Securing Chip Manufacturing Against Growing Cyber Threats


Semiconductor manufacturers are wrestling with how to secure a highly specialized and diverse global supply chain, particularly as the value of their IP and their dependence upon software increases — along with the sophistication and resources of the attackers. Where methodologies and standards do exist for security, they often are confusing, cumbersome, and incomplete. There are plenty of... » read more

What It Takes To Make An SoC Design Quantum Safe


When it comes to quantum computing attacks, the first question people ask is “will my design be impacted?” In the majority of cases, the answer is yes. For any device that cannot function with manually programmed symmetric keys, which is most devices, you must plan to make upgrades. The good news is that your architecture is not impacted. Secure domains remain secure domains and keys can be... » read more

A Hardware Accelerator Designed For The Homomorphic SEAL-Embedded Library


A technical paper titled "VLSI Design and FPGA Implementation of an NTT Hardware Accelerator for Homomorphic SEAL-Embedded Library" was published by researchers at University of Pisa. Abstract: "Homomorphic Encryption (HE) allows performing specific algebraic computations on encrypted data without the need for decryption. For this reason, HE is emerging as a strong privacy-preserving solution... » read more

Protecting Data And Devices Now And In The Quantum Computing Era


Quantum computing is being pursued across industry, government and academia with tremendous energy and is set to become a reality in the not-so-distant future. Once sufficiently large quantum computers exist, traditional asymmetric cryptographic methods for key exchange and digital signatures will be broken. Many initiatives have been launched throughout the world to develop and deploy new quan... » read more

How To Safeguard Memory Interfaces By Design


By Dana Neustadter and Brett Murdock In 2017, the credit bureau Equifax announced that hackers had breached its system, unleashing the personal information of 147-million people. As a result, the company has settled a class action suit for $425 million to aid those impacted, including identity theft, fraud, financial losses, and the expenses to clean up the damage. Whether the threat is iden... » read more

Securing IoT Devices With Lightweight Cryptography


The National Institute of Standards and Technology (NIST) recently announced the selection of a new family of cryptographic algorithms called ASCON, which have been developed for lightweight cryptography applications. In this blog, we will explore what lightweight cryptography is and why it is worth considering for specific Internet of Things (IoT) use cases. In summary, lightweight cryptogr... » read more

Security Highlight: Ascon


The contest for standardization of a lightweight crypto (LWC) algorithm has just finished. US standards body NIST selected Ascon as the winner. Ascon is an algorithm proposed by an international team of scientists that delivers strong performance and security at a low cost. How does that work? Lightweight crypto is symmetric encryption technology, that runs well on constrained systems, lik... » read more

Hardware Accelerator For Fully Homomorphic Encryption


A technical paper titled "CraterLake: A Hardware Accelerator for Efficient Unbounded Computation on Encrypted Data" was published by researchers at MIT, IBM TJ Watson, SRI International, and University of Michigan. "We present CraterLake, the first FHE accelerator that enables FHE programs of unbounded size (i.e., unbounded multiplicative depth). Such computations require very large cipherte... » read more

Industry Adoption Of Line-Rate Network Security Using MACsec


Network security protocols are the primary means of securing data in motion — that is, data communicated between closely connected physical devices, or between devices, and even virtual machines connected using a complex infrastructure. This article will explore Media Access Control security (MACsec) and how it can be used to provide foundational level network security for a wide range of app... » read more

Security Solutions In A World Of IoT Devices


Internet of Things (IoT) devices are everywhere these days adding tremendous value, but unfortunately also representing unprecedented levels of risk for exploitation. Anything that is connected to the internet is potentially hackable. Securing connected devices is a challenge and is top of mind for electronics manufacturers who want to avoid the embarrassment of having their devices hacked. The... » read more

← Older posts Newer posts →