DPA Countermeasure Validation Program

Designed to deliver consistent, high-quality results for the certification of cryptographic modules, our Differential Power Analysis (DPA) Countermeasure Validation Program is a comprehensive and rigorous security testing procedure that uses independent accredited testing labs.

Our DPA Countermeasure Validation Program specifies procedures for independent testing of chipsets and system-on-chips (SoCs) to evaluate their resistance to DPA and related side-channel attacks. Designed to certify products that have been verified to contain suitable levels of DPA resistance and are properly licensed to use our DPA Countermeasures, this program helps chip purchasers and downstream customers identify licensed devices with the most robust and effective security against DPA attacks. Independent testing labs that have demonstrated outstanding expertise in the area of side-channel analysis are accredited by our Cryptography Research division to perform DPA Countermeasure Validation Program testing. Confidential information relevant to the evaluation is shared only with the testing laboratory and detailed reporting of the results is provided only to the product vendor with the fees negotiated directly between the evaluation lab and SoC manufacturers.
Introduction to Side-Channel Attacks eBook

Introduction to Side-Channel Attacks

Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). As all physical electronic systems routinely leak information, effective side-channel countermeasures should be implemented at the design stage to ensure protection of sensitive keys and data.

Solution Offerings

Protecting Electronic Systems eBook thumbnail

Protecting Electronic Systems from Side-Channel Attacks

Side-channel attacks comprise a wide range of techniques including Differential Power Analysis, Simple Power Analysis, Simple Electromagnetic Analysis, Differential Electromagnetic Analysis, Correlation Power Analysis and Correlation Electromagnetic Analysis. An effective layer of side-channel countermeasures should therefore be implemented via hardware (DPA resistant cores), software (DPA resistant libraries) or both. After layered countermeasures have been implemented, systems should be carefully evaluated to confirm the cessation of sensitive side-channel leakage.

Inventions

Security Icon

DPA Countermeasures

DPA Countermeasures are fundamental techniques for protecting against Differential Power Analysis (DPA) and related side-channel attacks. Consisting of a broad range of software, hardware, and protocol techniques, DPA Countermeasures include reducing leakage, introducing amplitude and temporal noise, balancing hardware and software, incorporating randomness, and implementing protocol level countermeasures.

Rambus logo