datasheets.com EBN.com EDN.com EETimes.com Embedded.com PlanetAnalog.com TechOnline.com  
Events
UBM Tech
UBM Tech
Welcome Guest Log In | Register

The Right and Wrong way to Implement Cryptographic Algorithms in Embedded Electronic Systems

Authored on: Jun 1, 2013

Technical Paper

0 1
More InfoLess Info
While cryptographic algorithms such as AES and RSA are standardized, so results from one implementation match another, important security considerations are highly implementation dependent. Designs that are functionally correct may not always be suitable, especially in embedded applications, because an attack technique called differential power analysis (DPA) can be used to extract the secret keys. DPA is remarkably effective against almost any software- or hardware-based cryptographic implementation (microcontroller, ASIC, or FPGA), unless countermeasures are used. How DPA works will be described, and implications of the attack to typical security applications presented. Several countermeasures suitable for software or co-processor (e.g., FPGA) implementations will be shown.

Please disable any pop-up blockers for proper viewing of this paper.

1 comment
write a comment

No Avatar

DCH Posted Jul 17, 2013

This is a very well written paper. I appreciate that the author provides in depth information from a variety of sources. This is not just another marketing paper.

reply

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page