Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
In this paper, FortifyIQ introduces Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes involving arithmetical addition. This methodology is applied to what is believed to...
In this paper, FortifyIQ introduces Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes involving arithmetical addition. This methodology is applied to what is believed to be the first published full-fledged attack on HMAC-SHA-2 which does not require a profiling stage.
First Full-Fledged Side Channel Attack on HMAC-SHA-2
FortifyIQ presents a novel practical template attack on HMAC-SHA-2 intended primarily against its implementations in hardware. Side-channel attacks pose a threat to cryptographic algorithms. HMAC is an important use case...
FortifyIQ presents a novel practical template attack on HMAC-SHA-2 intended primarily against its implementations in hardware. Side-channel attacks pose a threat to cryptographic algorithms. HMAC is an important use case of a hash function, in which the input is partially secret and thus unknown to the attacker. Despite a few publications that discuss applications of power analysis techniques to attack HMAC-SHA-2, this is the first generic method that shows a full attack on its hardware implementation.
RAMBAM: A New Very Compact and Efficient Protection of AES against SC and FI attacks
This is an academic paper describing a protection method for AES which is very efficient, and configurable for any application. It introduces RAMBAM, an innovative algebraic masking technique designed to...
This is an academic paper describing a protection method for AES which is very efficient, and configurable for any application. It introduces RAMBAM, an innovative algebraic masking technique designed to protect against side-channel attacks and SIFA1.
STORM— Small Table Oriented Redundancy-based SCA Mitigation for AES
STORM effectively solves the long-standing challenge of combining high security against SCA with low gate count and high performance for AES implementations by offering a different tradeoff (memory utilization) that...
STORM effectively solves the long-standing challenge of combining high
security against SCA with low gate count and high performance for AES implementations
by offering a different tradeoff (memory utilization) that may be preferable to RAMBAM
in many practical cases.
HOW TO STEAL A GLOBAL COMPANY’S BUSINESS BY BREAKING INTO JUST ONE OF THEIR DEVICES
Discover a new approach to developing protection for smart cards against Differential Power Analysis (DPA) attacks,
Discover a new approach to developing protection for smart cards against Differential Power Analysis (DPA) attacks, allowing manufacturers to cut protection costs and save time during development.
GLOBAL CRYPTOGRAPHIC KEYS IN THE IOT WORLD AND THE THREATS THEY PRESENT
Of the various kinds of side-channel attacks, Differential Power Analysis (DPA) is the cheapest to deploy
Of the various kinds of side-channel attacks, Differential Power Analysis (DPA) is the cheapest to deploy with potentially the highest amount of damage to the manufacturer. What can be done to protect IoT devices from such attacks?
FortifyIQ offers a complete suite of solutions for DPA, SPA and FI detection, analysis, and recommendations
FortifyIQ offers a complete suite of solutions for DPA, SPA and FI detection, analysis, and recommendations for protecting your microchips and products from successful DPA and FI attacks.
FortifyIQ offers a complete suite of solutions for DPA, SPA and FI detection, analysis, and recommendations for protecting your microchips and products from successful DPA and FI attacks.
Of the various kinds of side-channel attacks, Differential Power Analysis (DPA) is the cheapest to deploy with potentially the highest amount of damage to the manufacturer. What can be done to protect IoT devices from such attacks?
Discover a new approach to developing protection for smart cards against Differential Power Analysis (DPA) attacks, allowing manufacturers to cut protection costs and save time during development.
Attackers can now breach your device for just a few hundred dollars unless robust security measures are in place. Watch our webinar to learn how our solution ensures you no longer have to compromise between security and functionality.
Get a deep dive into the world of FortifyIQ’s protected IP cores and ultra-high bandwidth engines based on these IP cores. Learn all about the different core configurations and much more in this introductory video.
Learn how SideChannel Studio helps you find the source of side-channel leakage through a series of explanatory screenshots. Watch this detailed video now!