ALISO VIEJO, USA: Microsemi Corp. announced the immediate availability of INVIA's differential power analysis (DPA)-resistant products on Microsemi's flash-based FPGA devices and SmartFusion, the industry's only customizable system-on-chip (cSoC) solution which integrates an FPGA with analog functions and a hard ARM MCU core.
DPA is a technique used by hackers to extract secret keys and compromise the security of semiconductors and tamper-resistant devices by analyzing their power consumption. Microsemi is the only major provider of cSoCs and FPGAs to hold a patent license from Cryptography Research, Inc (CRI) for DPA-countermeasures, and to offer INVIA's software libraries for AES, RSA and ECC cryptographic algorithms.
"Our collaboration with INVIA provides our customers with leading-edge solutions that guard against the increasingly serious threat of DPA security breaches in government, industrial, financial and other high-profile applications," said Esam Elashmawi, VP and GM at Microsemi. "Combined with our ability to pass through Microsemi's CRI license to customers for many products, this allows them to employ DPA countermeasures quickly and efficiently—truly maximizing our relationships for the benefit of our customer base."
INVIA's DPA- and fault-resistant cryptographic library runs on Microsemi's SmartFusion single-chip cSoC, which features a Cortex-M3 MCU, a full-fledged FPGA and analog circuits all on a single-chip. Available immediately are INVIA's DPA-resistant implementations of the popular AES private key, RSA public key algorithms and ECC public key algorithm.
"We're pleased that through our partnership with Microsemi, we're able to deliver customers crypto-algorithms designed to resist the most advanced side-channel and fault-injection attacks," said Martin Gallezot, marketing and sales director of INVIA. "Software with this level of security used to be available only on smart card-like devices. It is now available on SmartFusion devices."
Monday, December 19, 2011
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.