For those among you who have read my previous SemiWiki articles, you will no doubt see a theme: the security of our connected world is badly broken, and for the bad guys, violating our online lives – both business and personal – is as easy as taking candy from the proverbial baby.… Read More
Tag: authentication
IoT Collateral Damage – it’s not if, but when
Business history is littered with once-successful companies that couldn’t see the market tsunami that was coming their way until it was too late to do anything but stand up and be walloped by a wave of change that obliterated their businesses.
… Read More
PUF the Magic (IoT) Dragon
Most people are familiar with Biometrics, the measurement of unique physical characteristics, such as fingerprints, and facial features, for the purpose of verifying human identity with a high level of certainty. The iris and even a person’s electrocardiogram (ECG) can be used as a secure biometric identifier.… Read More
Future Shock – IoT benefits beyond traffic and lighting energy optimization
The year is 2029, approximately 35 years after the Internet went mainstream and today the world, its people and things are connected in ways that the Internet’s pioneers could never have imagined. The Internet of Things (IoT) or as Cisco put it, The Internet Of Everything (IoE) is now a reality, enhancing our lives in myriad ways.… Read More
Greetings from Digitopia!
When it comes to the privacy and security of data, what does the future hold for consumers, companies and governments?
A tremendously interesting document, called “Alternate Worlds,” was published by the U.S. National Intelligence Council. It’s a serious document that not only examines four different alternatives of what … Read More
Is the Internet of Things just a toy?
The Internet of Things (IoT) is arguably the most hyped concept since the pre-crash dot-com euphoria. You may recall some of the phrases from back then such as “the new economy,” “new paradigm,” “get large or get lost,” “consumer-driven navigation,” “tailored web experience,” “it’s different now,” among countless other media… Read More
Getting up close and personal with symmetric session key exchange
In today’s world, the three pillars of security are confidentiality, integrity (of the data), and authentication (i.e. “C.I.A.”). Fortunately, Atmel CryptoAuthentication crypto engines with secure key storage can be used in systems to provide all three of these.
Focusing on the confidentiality pillar, in a symmetric system… Read More
There’s good news about BadUSB
The good news about the recently-revealed BadUSB is that there actually is a cure: Hardware crypto engines were invented to protect software, firmware and hardware from exactly these types of attacks, among many others. These uber-tiny, ultra secure hardware devices can be easily and cost-effectively added to USB sticks (and… Read More
What is Authentication and Why Should You Care?
Authentication means making sure that something is real, just like it sounds.In the real world, authentication has many uses. One of the most recognizable is anti-counterfeiting, which means validating the authenticity of a removable, replaceable, or consumable client. Examples include system accessories, electronic … Read More
NVM central to multi-layer trust in cloud
Pop quiz: Name one of the hottest applications for non-volatile memory – A) processor and code configuration; B) RFID tags; C) secure encryption keys; D) all the above. The answer is D, but not in the way you may be thinking; a new approach is using all these ideas at once, combined in SoC designs targeting advanced security … Read More