This account is pending registration confirmation. Please click on the link within the confirmation email previously sent you to complete registration. Need a new registration confirmation email? Click here
Cryptography Research (CRI), a division of Rambus Inc. (NASDAQ:RMBS), today announced the accreditation of Riscure as an independent testing lab to conduct evaluations for the Differential Power Analysis (DPA) Countermeasure Validation Program. The program specifies procedures for rigorous independent testing of products to evaluate their resistance to DPA and related side channel attacks to help chip purchasers and downstream customers identify devices with the most effective security.
Cryptography Research accredited Riscure because of its expertise in testing complex devices for security against DPA and side channel attacks.
“Protection against DPA is increasingly critical for a broad spectrum of SoCs and devices,” said Pascal van Gimst, director sales and business development of Riscure. “We’re pleased to be a part of CRI’s DPA Countermeasure Validation Program, which is crucial in helping our customers understand and ensure security at both the hardware and software layers of set-top boxes, game consoles, mobile phones, tablets and other devices.”
Riscure, with offices located in San Francisco and the Netherlands, joins Brightsight BV in the Netherlands, Thales CEACI in France, and T-Systems in Germany, as the fourth security evaluation facility accredited to conduct testing under the DPA Countermeasure Validation Program. Products that pass the rigorous testing conducted by accredited labs become eligible to carry the “DPA Lock” certification symbol.
“CRI is pleased to announce Riscure as an accredited laboratory under the DPA Countermeasure Validation Program,” said Pankaj Rohatgi, technical director, Hardware Security Solutions of CRI. “This accreditation reflects Riscure’s extensive expertise in security testing, including side-channel analysis of smart card ICs, pay television SoCs, FPGAs, and other devices.”
Differential power analysis attacks extract secret keys by analyzing measurements in the power consumption of a target device. Cryptography Research licenses DPA countermeasure technologies to a broad spectrum of chip and product vendors, included in over 6 billion devices a year. The DPA Countermeasure Validation Program specifies a suite of tests to verify the effectiveness of a device's countermeasures against power analysis attacks.