|DPA Resistant Core||Commercial, Government|
|DPA Resistant Software Libraries||Commercial, Government|
|DPA Workstation Platform||SoC/System Mfrs, Testing Labs|
|Consulting Services||SoC/System Mfrs, Testing Labs|
|Education & Training||SoC/System Mfrs, Testing Labs|
|Validation Program||SoC/System Mfrs, Testing Labs|
|Licensed Countermeasures||Commercial, Government|
Robust countermeasures to protect against side-channel attacks
Broad range of hardware, software and protocol approaches
Cores validated to resist DPA attacks in millions of traces
Simplified device testing for power analysis vulnerabilities
Training, evaluation services and analysis equipment
Ready-to-use DPA Resistant solutions
Solutions can be optimized for performance, size, and security level
Solutions integrate with standard cipher modes such as CBC, ECB, etc.
Understanding DPA Countermeasures
Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). As all physical electronic systems routinely leak information, effective side-channel countermeasures should be implemented at the design stage to ensure protection of sensitive keys and data.
Billions of devices deployed across numerous industries already meet stringent standards for side-channel resistance. Many use our IP cryptographic cores and software libraries to protect against DPA and related side-channel attacks.
As part of our ecosystem enablement, we offer our DPA Workstation™ Platform to customers and partners as a powerful and flexible tool for evaluating the level of DPA resistance within a device or system. It includes customized test fixtures and a proprietary DPA software suite with source code.
Additionally, we have established a comprehensive third-party validation program to certify the DPA resistance of cryptographic modules for SoCs, systems manufacturers and testing labs.
Side-channel attacks comprise a wide range of techniques including Differential Power Analysis, Simple Power Analysis, Simple Electromagnetic Analysis, Differential Electromagnetic Analysis, Correlation Power Analysis and Correlation Electromagnetic Analysis. An effective layer of side-channel countermeasures should therefore be implemented via hardware (DPA resistant cores), software (DPA resistant libraries) or both. After layered countermeasures have been implemented, systems should be carefully evaluated to confirm the cessation of sensitive side-channel leakage.
FREE Webinar: Understanding Fault Injection Attacks and Their Mitigation