algorithm

>algorithm

TEMPEST side-channel attacks recover AES-256 encryption keys

In a recently published paper, security researchers built a miniature system capable of covertly recovering encryption keys using side-channel analysis. Fox-IT’s Craig Ramsay and Jasper Lohuis collaborated with Riscure to perform this analysis against two [...]

Semiconductor Engineering highlights side-channel attacks

Brian Bailey of Semiconductor Engineering has written an article that highlights the danger side-channel attacks pose to connected devices and systems. “As the world begins to take security more seriously, it becomes evident that a device is [...]

Protecting avionic systems from side-channel attack

Asaf Ashkenazi, a senior director of product marketing at Rambus’ security division, recently sat down with Neil Tyler of NewElectronics to discuss the potential threat side-channel attacks pose to avionic systems. As Tyler points out, [...]

This algorithm steals ATM PINs from wearables

, ,

Security researchers at Binghamton University and the Stevens Institute of Technology have successfully combined smartwatch sensor data with an algorithm to crack ATM PINs. As Megan Scudellari of IEE Spectrum reports, Chen Wang of Binghamton [...]

ECEBS talks open standards and security

Stephen McSpadden, Head of Solutions at Ecebs, now part of Rambus, recently spoke with Steve Atkins of ContactlessIntelligence about smart ticketing and open standards. https://www.youtube.com/watch?v=MYmeU-XlDSY As McSpadden notes, Ecebs is a leading supplier of [...]

Creating and cracking secure ciphers

Steven Woo, VP of Solutions Marketing at Rambus, recently sat down with Ernest Worthman of Semiconductor Engineering to discuss the concept of secure ciphers. “One of the key challenges is how to develop a cipher [...]

Military cyber security should start at the core

Military & Aerospace Electronics editor John Keller recently confirmed that cyber warfare and cyber security are “hot issues” in the aerospace and defense electronics industry. “Cyber security is considered to be one of the few [...]