Protected against differential power analysis (DPA) and related attacks.



Connected devices invade progressively our homes for various raisons. From security needs to entertainment envies, the infatuation is exciting. 

However, this growing momentum is impacted by a set of growing threats related to security, privacy and economical stakes. 


According to Paul Kocher, president and chief scientist of the Rambus Cryptography Research division, ''it becomes easier to mount attacks using DPA. Growing threats are impacting the content distribution market''.


Based on this reality, Cryptography Research Division and MStar, (a semiconductor company for display and digital home solutions), have signed a license agreement for the inclusion of advanced DPA countermeasure technologies developed by Cryptography Research in MStar products. 

Connectikpeople.co can observe that, by incorporating these patented technologies, MStar’s tamper-resistant products, including set-top box chipsets, can be protected against differential power analysis (DPA) and related attacks. 

For those who unfamiliar, Connectikpeople.co DPA is billed as, a form of side-channel attack that involves monitoring the fluctuating electrical power consumption or EM emissions from a target device and then using advanced statistical methods to derive cryptographic keys and other secrets from chips. 

Cryptography Research DPA countermeasure technologies are designed to protect devices against certain types of attacks that can extract cryptographic keys and other sensitive data from chips in set-top boxes and other home networking products.

Popular Posts