Side-channel attacks conducted against electronic systems are relatively simple and inexpensive to execute. An attacker does not need to know specific implementation details of the cryptographic device to perform these attacks and extract keys. As all physical electronic systems routinely leak information, effective side-channel countermeasures such as Rambus’ DPA Resistant Hardware Cores (DPARC) or DPA Software Library (DPASL) should be implemented at the design stage to ensure protection of sensitive keys and data. After the implementation of hardware or software countermeasures, systems should be carefully evaluated with a Test Vector Leakage Assessment (TVLA) platform such as the Rambus DPA Workstation (DPAWS) to confirm the cessation of sensitive side-channel leakage.
Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). An attacker does not need to know specific implementation details of the cryptographic device to perform these attacks and extract keys. As all physical electronic systems routinely leak information, effective side-channel countermeasures should be implemented at the design stage to ensure protection of sensitive keys and data.
Our DPA Workstation™ (DPAWS) 8 is a comprehensive analysis platform for the evaluation of device resistance to side-channel attacks, including SPA, DPA, HO-DPA, and EMA. Side-channel attacks are low-cost, noninvasive methods that enable attackers to extract secret cryptographic keys from electronic devices during normal operations. Learn more about our DPA Workstation Testing Platform, and how it enables customers to quickly and easily identify and address potential security flaws in temper-resistant systems and SoCs.
Addressing the growing demand for readily available solutions that implement Differential Power Analysis (DPA) countermeasures, Rambus Cryptography Research developed a family of semiconductor IP cryptographic cores and software libraries that are designed to protect against side-channel attack vulnerabilities. Learn more about our DPA Resistant Software Libraries, and its flexible integration with standard cipher modes such as Cipher Block Chaining (CBC), Electronic Code Book (ECB), etc. in this brief.
Rambus DPA Resistant Hardware Cores, when integrated into an SoC, prevent against the leakage of secret cryptographic key material through attacks. These superior performance cores are easy to integrate into SoCs and FPGAs, providing robust side-channel resistance across different security and performance levels. Our DPA Resistant Hardware Cores support industry standard cryptographic algorithms and random number generators such as: AES, TDES, SHA-2, HMAC, RSA and ECC across multiple operating modes.