Security division icon


DPA Workstation Analysis Platform

Designed for leading security chip vendors, product companies, testing labs, and government organizations, the DPA Workstation analysis platform is the world’s premier side-channel analysis platform that includes all of the hardware, software, and training needed to evaluate and certify secure devices.


Product Brief

DPA Workstation

Click the video above to learn more about DPA Workstation 8

How it works

DPA Workstation (DPAWS) 8 is a powerful and flexible testing platform that includes an integrated suite of hardware and powerful data visualization software for testing and analyzing the vulnerabilities of cryptographic chips and systems to power and electromagnetic (EM) side-channel attacks. Designed to support every stage of the side-channel analysis process, DPAWS 8 enables customers to quickly and easily identify and address potential security flaws in tamper-resistant systems and SoCs.

DPAWS allows an analyst to collect power consumption or electromagnetic emission signals coming from a cryptographic device while it performs operations using secret keys. These collected signals can be examined using Simple Power and Electromagnetic Analysis (SPA/SEMA) or more powerful Differential Power and Electromagnetic Analysis (DPA/DEMA) to identify exposure of secret keys.

Log-in to access the DPA Support portal.

What’s Included

Our platform includes everything needed to collect, process, and analyze algorithms and devices out of the box. Custom test fixtures are included for analysis of smart cards and FPGA algorithms. Additionally, DPAWS provides the flexibility so that you can interface to your own devices. Signal probes, filters, and a wideband amplifier, used to acquire signals from a device under test, are provided with the DPAWS to improve your startup time. A carefully selected digital oscilloscope and PCI data acquisition card facilitate a wide variety of data collection. Collections and analyses can be scripted using native Python or MATLAB modules. Powerful visualization and analysis tools are included to facilitate the rapid and complete testing of hypotheses.

Customers also receive an in-depth training course covering both theoretical and practical aspects side-channel analysis.

DPAWS is available to testing labs, product vendors and organizations with business needs for side-channel analysis capabilities. Product vendors can pre-test products, saving testing costs and product development time.

Introduction to Side-Channel Attacks eBook

Introduction to Side-Channel Attacks

Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). An attacker does not need to know specific implementation details of the cryptographic device to perform these attacks and extract keys. As all physical electronic systems routinely leak information, effective side-channel countermeasures should be implemented at the design stage to ensure protection of sensitive keys and data.

Download eBook

Solution Offerings

Protecting Electronic Systems from Side-Channel Attacks

As all physical electronic systems routinely leak information, effective side-channel countermeasures such as Rambus’ DPA Resistant Hardware Cores (DPARC) or DPA Software Library (DPASL) should be implemented at the design stage to ensure protection of sensitive keys and data. After the implementation of hardware or software countermeasures, systems should be carefully evaluated with a Test Vector Leakage Assessment (TVLA) platform such as the Rambus DPA Workstation (DPAWS) to confirm the cessation of sensitive side-channel leakage.

Download eBook


DPA Countermeasures


DPA Countermeasures are fundamental techniques for protecting against Differential Power Analysis (DPA) and related side-channel attacks. Consisting of a broad range of software, hardware, and protocol techniques, DPA Countermeasures include reducing leakage, introducing amplitude and temporal noise, balancing hardware and software, incorporating randomness, and implementing protocol level countermeasures.

Related Markets & Applications

Aerospace & Defense
Mobile Edge