Security division Icon


Consulting Services

Our consulting services include design services, product evaluations, and DPA training workshops. By helping clients define their security objectives and deploy effective solutions, we can minimize the costs associated with conservative security practices.


Design Services

Our Cryptography Research division can contribute to all portions of secure product design – from concept generation and protocol design to product development and operational integration.

Our in-house cryptographers have extensive experience with deployed security protocols, software, and hardware. We understand tightly-constrained systems that require mobility, tamper resistance, rigid cost constraints, and renewable security. Example projects include:

  • Design of cryptographic protocols for stored value, communication, prepaid cellular telephone, and content protection systems.
  • Architecture and implementation of fully-functional prototype for securely distributing content in digital cinema environment.
  • Development of firmware to secure embedded systems against cloning or modification.
  • Cryptographic design of SSL 3.0 – the world’s most widely used security protocol.
  • ASIC design for high-threat environments.


Evaluation Services

Evaluations are crucial for systems where attacks are anticipated or where failure scenarios may be extremely difficult to manage. By working to identify and analyze all security risks under a specified threat model, our evaluators can help anticipate and assess the likelihood of system failure.

  • Architecture reviews: Set-top boxes, PC platforms, handheld devices, authentication tokens
  • Specification reviews
  • Forensic analysis – identification of methods used and weaknesses in pirate pay TV equipment and in financial fraud
  • Differential Power Analysis evaluations of smartcards and secure tokens
  • Component reviews: Random number generators, cryptographic cores
  • Protocol reviews: Financial transactions, secure messaging, wireless applications
  • Infrastructure reviews: Code update, secure renewability


Research Efforts

Our research efforts identify new and more efficient ways to protect information in real-world situations.

Content Security Research Initiative
Read about results from a multi-year research effort to study technical solutions and next-generation methods for controlling piracy.

Record Breaking DES Key Search
Our researchers designed a record-breaking DES Key Search Machine and won the RSA DES Challenge on July 15, 1998 after searching for 56 hours


DPA Training Workshops

Our security experts provide technical tutorials, hands-on workshops, and training seminars with facilitated discussion. Clients use our training to understand security-critical challenges and help project teams transition to new security problems. Training sessions are typically 1-4 working days and can be delivered at your office or at our San Francisco office.

To learn more about our workshops and sign up, click here.


DPA Countermeasures


DPA Countermeasures are fundamental techniques for protecting against Differential Power Analysis (DPA) and related side-channel attacks. Consisting of a broad range of software, hardware, and protocol techniques, DPA Countermeasures include reducing leakage, introducing amplitude and temporal noise, balancing hardware and software,

Related Markets & Applications