As we’ve previously discussed on Rambus Press, DPA is a type of side-channel attack that involves monitoring variations in the electrical power consumption or EM emissions from a target device. These measurements can then be used to derive cryptographic keys and other sensitive information from chips. This is precisely why Rambus’ Cryptography Research division has developed a comprehensive portfolio of application-specific hardware core and software library solutions that can be used to build DPA resistant products.
In addition to DPA countermeasures, Rambus has designed a DPA Workstation (DPAWS) platform for its customers and partners. Essentially, DPAWS analyzes hardware and software cryptographic implementations for vulnerabilities to power and electromagnetic side-channel attacks. Specifically, DPAWS enables users to quickly assess any vulnerability that an FPGA, ASIC, CPU or microcontroller may have to side-channel analysis.
DPAWS also includes an integrated suite of hardware and data visualization software to aid in the identification and understanding of vulnerabilities in cryptographic chips.
This includes:
A project library manager that delivers an integrated view of multiple data sets, scripts and analyses. A powerful trace display with an intuitive interface for easy analysis. Integrated scripting modules for MatLab and Python.
NVIDIA licenses Rambus DPA to thwart side-channel attacks
Posted on Tuesday, October 25 2016 @ 15:45 CEST by Thomas De Maesschalck