Found 207 Results

Root of Trust for FPGAs Product Brief

https://go.rambus.com/root-of-trust-for-fpgas-product-brief#new_tab

The Root of Trust for FPGAs is a fully-programmable embedded FIPS 140-2 certified hardware security Root of Trust co-processor integrated in programmable logic. The Root of Trust for FPGAs is a siloed hardware security block, offering secure execution of user applications, tamper detection and protection, secure storage and handling of keys and security assets, resistance […]

Root of Trust for FPGAs

https://www.rambus.com/security/root-of-trust/root-of-trust-for-fpgas/

Root of Trust for FPGAs Contact Us FPGAs (Field Programmable Gate Arrays) are widely used in industries such as Defense, Telecommunications, Automotive and AI/ML (Artificial Intelligence/Machine Learning) because of their reconfigurability and flexibility. Whether functioning as the essential building blocks of avionics and spacecraft systems, controlling ADAS (Advanced Driver Assisted Systems) systems, or assisting inference […]

A Modern Interpretation of Kerckhoff

https://www.rambus.com/blogs/a-modern-interpretation-of-kerckhoff/

In the late 19th century, Dutch cryptographer Auguste Kerckhoff postulated what has become known as “Kerckhoff’s Principle” — a cryptosystem should be secure even if everything about the system, except the key, is public knowledge. Since Kerckhoff’s days, cryptography has certainly evolved. A modern interpretation of Kerckhoff teaches that you shouldn’t rely on the obscurity of your crypto algorithm, […]

Understanding Anti-Tamper Technology: Part 3

https://www.rambus.com/blogs/understanding-anti-tamper-technology-part-3/

Written by Scott Best for the Rambus Blog In part one of this three-part blog series, we discussed the low-cost attacks that target security chips such as protocol and software attacks, brute force glitch attacks, as well environmental attacks. In part two, we took a closer look at attacks executed by more sophisticated adversaries. These […]

Understanding Anti-Tamper Technology: Part 2

https://www.rambus.com/blogs/understanding-anti-tamper-technology-part-2/

Written by Scott Best for the Rambus Blog In part one of this three-part blog series, we discussed the low-cost attacks that target security chips such as protocol and software attacks, brute force glitch attacks, as well environmental attacks. In this blog post, we explore attacks executed by more sophisticated adversaries. These include side-channel attacks, […]

Side-Channel Attacks Target Machine Learning (ML) Models

https://www.rambus.com/blogs/side-channel-attacks-target-machine-learning-ml-models/

Written by Paul Karazuba for Rambus Press A team of North Carolina State University researchers recently published a paper that highlights the vulnerability of machine learning (ML) models to side-channel attacks. Specifically, the team used power-based side-channel attacks to extract the secret weights of a Binarized Neural Network (BNN) in a highly-parallelized hardware implementation. “Physical […]

Anti-Tamper Cryptographic Cores

https://www.rambus.com/security/dpa-countermeasures/dpa-resistant-core/anti-tamper-cryptographic-cores/

Security Anti-Tamper Cryptographic Cores Rambus DPA (Differential Power Analysis) Resistant Cryptographic hardware cores guard against the various side channel attacks that exploit unprotected cryptographic designs. Easily integrated into an ASIC or FPGA design, these cores resist tampering attacks attempting to obtain secret cryptographic key material through Differential Power Analysis (DPA), Differential Electromagnetic Analysis (DEMA) or […]

Rambus Licenses DPA Countermeasures to Utimaco

https://www.rambus.com/rambus-licenses-dpa-countermeasures-to-utimaco/

Cutting-edge hardware-based security technologies protect against side-channel attacks SUNNYVALE, Calif. – March 25, 2020 – Rambus Inc. (NASDAQ: RMBS) a premier silicon IP and chip provider making data faster and safer, today announced that it has signed a patent license agreement with Utimaco, a leading supplier of Hardware Security Modules (HSMs). The agreement includes the […]

Plundervolt steals keys from cryptographic algorithms

https://www.rambus.com/blogs/plundervolt-steals-keys-from-cryptographic-algorithms/

An international team of white hat researchers has successfully corrupted the integrity of Intel Software Guard Extensions (SGX) on Intel Core processors with a software-based fault injection attack aptly dubbed “Plundervolt.” Using Plundervolt, attackers can recover keys from cryptographic algorithms (including the AES-NI instruction set extension) and induce memory safety vulnerabilities into bug-free enclave code. […]

PKA-IP-150

https://www.rambus.com/security/crypto-accelerator-cores/pka-ip-150/

PKA-IP-150 RSA/ECC Public Key Accelerators Contact Us The PKA-IP-150 is a family of Public Key Accelerators (PKA) IP cores designed for full scalability and an optimal “performance over gate count” deployment. Silicon-proven, the PKA-IP-150 address the unique high-speed, high-security requirements of semiconductor OEMs and provides a reliable and cost-effective IP solution that is easy to […]

Rambus logo