Security division Icon

Security

DPA Resistant Software Library

DPA Resistant Software Libraries are a portfolio of unique products that provide performance optimized, quantifiable side-channel resistant security for embedded software systems with seamless integration across a wide range of applications. Our software libraries come in two main varieties, platform neutral C-code which is designed to run on any platform and optimized code for ARM Cortex platforms, providing a wide range of device design options.

Contact

Product Brief

DPA Resistant Software Library diagram

How it works

The DPA Resistant Software Libraries offer OEMs an easy-to-integrate software package that is resistant to first and second order DPA attacks, allowing them to have strong security without the need of specific security hardware.

Our high performance software libraries offer application builders an easy-to-integrate software security solution with built-in quantifiable side-channel resistance. The libraries are validated by Rambus for performance across a range of compilers and processors to protect against key extraction of up to 1 million traces, compared to 1 to 10K traces for non-protected implementations like Gladman reference code or other commercial and open source crypto libraries.

The implemented data structures and APIs allow easy integration in industry standard software security protocol implementations by swapping their unprotected cryptographic primitives with protected versions available in the selected DPA-Resistant Software Library.

Example AES-128 Implementation

Download Introduction to Side-Channel Attacks

Solution Offerings

Inventions

DPA Countermeasures

security-icon

DPA Countermeasures are fundamental techniques for protecting against Differential Power Analysis (DPA) and related side-channel attacks. Consisting of a broad range of software, hardware, and protocol techniques, DPA Countermeasures include reducing leakage, introducing amplitude and temporal noise, balancing hardware and software, incorporating randomness, and implementing protocol level countermeasures.

Related Markets & Applications