Rambus proudly announced NVIDIA has licensed its Differential Power Analysis (DPA), a set of countermeasures to protect against side-channel attacks. NVIDIA will use the technology to ensure the integrity of its solutions, we assume it will be used primarily for professional applications like artificial intelligence and autonomous cars.
As we’ve previously discussed on Rambus Press, DPA is a type of side-channel attack that involves monitoring variations in the electrical power consumption or EM emissions from a target device. These measurements can then be used to derive cryptographic keys and other sensitive information from chips. This is precisely why Rambus’ Cryptography Research division has developed a comprehensive portfolio of application-specific hardware core and software library solutions that can be used to build DPA resistant products.
In addition to DPA countermeasures, Rambus has designed a DPA Workstation (DPAWS) platform for its customers and partners. Essentially, DPAWS analyzes hardware and software cryptographic implementations for vulnerabilities to power and electromagnetic side-channel attacks. Specifically, DPAWS enables users to quickly assess any vulnerability that an FPGA, ASIC, CPU or microcontroller may have to side-channel analysis.
DPAWS also includes an integrated suite of hardware and data visualization software to aid in the identification and understanding of vulnerabilities in cryptographic chips.
A project library manager that delivers an integrated view of multiple data sets, scripts and analyses.
A powerful trace display with an intuitive interface for easy analysis.
Integrated scripting modules for MatLab and Python.