Security division Icon


DPA Resistant Software Library

Addressing the growing demand for readily available solutions that implement Differential Power Analysis (DPA) countermeasures, we developed a family of cryptographic cores and software libraries that are designed to protect against side-channel attacks. Our DPA Resistant Software Library incorporates many of the commonly used cryptographic algorithms. This library is validated to resist first- and second-order DPA attacks in over 1 million traces.


Product Brief

DPA Resistant Software Library diagram

The DPA Resistant Software Library is easy to deploy in a security software stack, and is highly flexible for integration with standard cipher modes such as Cipher Block Chaining (CBC), Electronic Code Book (ECB), etc. It implements advanced DPA countermeasures against side-channel attacks providing robust DPA resistance.

Our DPA resistance-proven library is easy-to-integrate into the application stack, providing chipmakers with a seamless solution that enables them to devote resources to differentiating features and reduce implementation time.

Solution Offerings

Introduction to Side-Channel Attacks eBook

Introduction to Side-Channel Attacks

Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). An attacker does not need to know specific implementation details of the cryptographic device to perform these attacks and extract keys. As all physical electronic systems routinely leak information, effective side-channel countermeasures should be implemented at the design stage to ensure protection of sensitive keys and data.

Download eBook


DPA Countermeasures


DPA Countermeasures are fundamental techniques for protecting against Differential Power Analysis (DPA) and related side-channel attacks. Consisting of a broad range of software, hardware, and protocol techniques, DPA Countermeasures include reducing leakage, introducing amplitude and temporal noise, balancing hardware and software, incorporating randomness, and implementing protocol level countermeasures.

Related Markets & Applications

Aerospace & Defense
Mobile Edge