Protected against differential power analysis (DPA) and related attacks.
Connected devices
invade progressively our homes for various raisons. From security needs to
entertainment envies, the infatuation is exciting.
However, this growing
momentum is impacted by a set of growing threats related to security, privacy
and economical stakes.
According to Paul Kocher, president and chief scientist of the Rambus Cryptography Research division, ''it becomes easier to mount attacks using DPA. Growing threats are impacting the content distribution market''.
Based on
this reality, Cryptography Research Division and MStar, (a semiconductor
company for display and digital home solutions), have signed a license
agreement for the inclusion of advanced DPA countermeasure technologies
developed by Cryptography Research in MStar products.
Connectikpeople.co can observe that, by incorporating these patented technologies, MStar’s
tamper-resistant products, including set-top box chipsets, can be protected
against differential power analysis (DPA) and related attacks.
For those
who unfamiliar, Connectikpeople.co DPA is billed as, a form of
side-channel attack that involves monitoring the fluctuating electrical power
consumption or EM emissions from a target device and then using advanced
statistical methods to derive cryptographic keys and other secrets from chips.
Cryptography
Research DPA countermeasure technologies are designed to
protect devices against certain types of attacks that can extract cryptographic
keys and other sensitive data from chips in set-top boxes and other home
networking products.