Crypto Key Exchange …like taking candy from a digital baby

Crypto Key Exchange …like taking candy from a digital baby
by Bill Montgomery on 01-31-2016 at 4:00 pm

Image RemovedFor those among you who have read my previous SemiWiki articles, you will no doubt see a theme: the security of our connected world is badly broken, and for the bad guys, violating our online lives – both business and personal – is as easy as taking candy from the proverbial baby.… Read More


IoT Collateral Damage – it’s not if, but when

IoT Collateral Damage – it’s not if, but when
by Bill Montgomery on 01-14-2016 at 4:00 pm

Business history is littered with once-successful companies that couldn’t see the market tsunami that was coming their way until it was too late to do anything but stand up and be walloped by a wave of change that obliterated their businesses.
Image RemovedRead More


PUF the Magic (IoT) Dragon

PUF the Magic (IoT) Dragon
by Bill Montgomery on 12-31-2015 at 7:00 am

Image RemovedMost people are familiar with Biometrics, the measurement of unique physical characteristics, such as fingerprints, and facial features, for the purpose of verifying human identity with a high level of certainty. The iris and even a person’s electrocardiogram (ECG) can be used as a secure biometric identifierRead More


Future Shock – IoT benefits beyond traffic and lighting energy optimization

Future Shock – IoT benefits beyond traffic and lighting energy optimization
by Bill Montgomery on 12-22-2015 at 12:00 pm

Image RemovedThe year is 2029, approximately 35 years after the Internet went mainstream and today the world, its people and things are connected in ways that the Internet’s pioneers could never have imagined. The Internet of Things (IoT) or as Cisco put it, The Internet Of Everything (IoE) is now a reality, enhancing our lives Read More


Greetings from Digitopia!

Greetings from Digitopia!
by Bill Boldt on 02-15-2015 at 7:00 pm

Image Removed

When it comes to the privacy and security of data, what does the future hold for consumers, companies and governments?

A tremendously interesting document, called “Alternate Worlds,” was published by the U.S. National Intelligence Council. It’s a serious document that not only examines four different alternatives… Read More


Is the Internet of Things just a toy?

Is the Internet of Things just a toy?
by Bill Boldt on 01-03-2015 at 5:00 pm

The Internet of Things (IoT) is arguably the most hyped concept since the pre-crash dot-com euphoria. You may recall some of the phrases from back then such as “the new economy,” “new paradigm,” “get large or get lost,” “consumer-driven navigation,” “tailored web experience,” “it’s different now,” among countless other mediaRead More


Getting up close and personal with symmetric session key exchange

Getting up close and personal with symmetric session key exchange
by Bill Boldt on 12-03-2014 at 2:00 am

In today’s world, the three pillars of security are confidentiality, integrity (of the data), and authentication (i.e. “C.I.A.”). Fortunately, Atmel CryptoAuthentication crypto engines with secure key storage can be used in systems to provide all three of these.

Image Removed

Focusing on the confidentiality pillar, in a … Read More


There’s good news about BadUSB

There’s good news about BadUSB
by Bill Boldt on 10-22-2014 at 4:00 am

The good news about the recently-revealed BadUSB is that there actually is a cure: Hardware crypto engines were invented to protect software, firmware and hardware from exactly these types of attacks, among many others. These uber-tiny, ultra secure hardware devices can be easily and cost-effectively added to USB sticks (andRead More


What is Authentication and Why Should You Care?

What is Authentication and Why Should You Care?
by Bill Boldt on 06-18-2014 at 10:00 pm

Image RemovedAuthentication means making sure that something is real, just like it sounds.In the real world, authentication has many uses. One of the most recognizable is anti-counterfeiting, which means validating the authenticity of a removable, replaceable, or consumable client. Examples include system accessories,Read More


NVM central to multi-layer trust in cloud

NVM central to multi-layer trust in cloud
by Don Dingee on 04-21-2014 at 4:00 pm

Pop quiz: Name one of the hottest applications for non-volatile memory – A) processor and code configuration; B) RFID tags; C) secure encryption keys; D) all the above. The answer is D, but not in the way you may be thinking; a new approach is using all these ideas at once, combined in SoC designs targeting advanced security … Read More