Winbond licenses DPA countermeasures from Rambus Cryptography Research
This entry was posted on Tuesday, September 22nd, 2015.
Winbond Electronics has licensed differential power analysis (DPA) countermeasures from Rambus’ Cryptography Research division. By implementing DPA countermeasures in flash memory components, Winbond will ensure the data integrity of products that run applications requiring a high level of security – including mobile payments, premium content, automotive and the Internet of Things (IoT).
“As we set out to provide our customers with the most secure hardware solutions, we know that protecting against the threat of side-channel attacks is a priority – especially in the mobile payments arena,” Chester Hwang Business Unit Leader of Secure memory solutions of Winbond explained in an official press release (insert press release link here). “Rambus DPA countermeasures ensure that Winbond’s TrustMETM flash memory components are protected from these types of attacks.”
Paul Kocher, chief scientist of the Rambus Cryptography Research division, expressed similar sentiments.
“As mobile devices or IoT objects increasingly manage sensitive data and encrypted transactions, it becomes more important than ever to safeguard them against security threats,” he said. “Our DPA countermeasures allow Windbond to develop DPA resistant flash memory components that are capable of passing high-level industry security certifications.”
As we’ve previously discussed on Rambus Press, physical electronic systems routinely leak information about the internal process of computing. In practical terms, this means attackers can exploit various side-channel techniques to gather data and extract secret cryptographic keys.
As such, the Rambus Cryptography Research division has designed a range of DPA countermeasures that offer a combination of software, hardware and protocol techniques specifically designed to protect tamper-resistant devices from side-channel attacks. These include leak reduction, incorporating randomness, generating amplitude and temporal noise, as well as executing protocol-level countermeasures.