Secure Networking With MACsec, IPsec, And TLS


As digital networks grow in complexity, securing data in transit has become a top priority. Cyber threats, ranging from man-in-the-middle attacks to large-scale data breaches, make strong encryption and authentication mechanisms essential. But network security is not a one-size-fits-all solution. Instead, it operates at different layers of the OSI model, with each layer offering unique protecti... » read more

Certified TRNG For Automotive


In today's tech-driven world, security and safety are more critical than ever, especially in the automotive sector. As cars become smarter and more connected, the need for robust cryptographic mechanisms to safeguard data and ensure secure communications grows. For decades, the automotive industry has been implementing numerous strategies to maintain vehicle safety. But now the industry is star... » read more

Automotive Security Shifts To The System Level


Cars are getting smarter, more complicated, and more vulnerable to cyberattacks. As the amount of semiconductor and software content continues to increase, so does the number of over-the-air updates and connections to edge-based servers and services, adding a variety of new vectors for attacks. Properly securing vehicles requires engineers to first identify all the possible connection points... » read more

Advanced Packaging: A Curse Or A Blessing For Trustworthiness?


In recent years, the issue of trustworthiness in electronics has become increasingly important, especially in areas where security is of the essence such as the automotive sector, industry, and critical infrastructure. These sectors depend on electronic systems that are not only powerful but also absolutely reliable and, above all, secure. This represents a major challenge, as the increasing co... » read more

Cryptography Does Not Equal Security


At Rambus, we often receive RFIs, RFPs and RFQs for security silicon IP cores to be used in our customer’s next semiconductor product. Such requests often contain a long shopping list of required cryptographic algorithms, their modes of operation, their key lengths or strengths and performance and sizing requirements. Depending on the target segment, additional requirements such as robustness... » read more

Edge And IoT Security Turning A Corner


Security is beginning to improve for a wide range of IoT and edge devices due to better tools, the implementation of new standards and methodologies, and an increasing level of collaboration and communication across different market segments that in the past had little or no interaction. Until recently, many vendors in cost-sensitive markets offered the bare minimum of security. To make matt... » read more

Averting Hacks Of PCIe Transport Using CMA/SPDM


This paper describes the component measurement and authentication (CMA) and security protocol and data model (SPDM) flow used to establish the secure channels required for the transmission of encrypted packets. The various approaches, namely the symmetric and asymmetric flows, will be discussed in establishing a secure connection with the implementation of CMA/SPDM packets through data objects.... » read more

Enhancing Compute Security Architecture For New-Age Applications


New-age AI-powered applications are becoming increasingly essential in our daily lives. Continuing to do so requires that these applications and services meet three primary challenges: Achieving high performance for complex compute tasks. Ensuring cost-effectiveness and seamless integration with existing infrastructure. Maintaining robust security and privacy measures. Historicall... » read more

Tools Needed To Track, Catalog Hardware Vulnerabilities


Monitoring for cyberattacks is a key component of hardware-based security, but what happens afterward is equally important. Logging and cataloging identified hardware vulnerabilities to ensure they are not repeated is essential for security. In fact, thousands of weak points have been identified as part of the chip design process, and even posted publicly online. Nevertheless, many companies... » read more

Where Cryptography Is Headed


Reports began surfacing in October that Chinese researchers used a quantum computer to crack military-grade AES 256-bit encryption. Those reports turned out to be wrong, but that did little to dampen concerns about what would happen if it was true. The looming threat of quantum computers breaking today's encryption, and the stockpiling of encrypted data in preparation for a time when it can ... » read more

← Older posts