More than just mobile phones for Mali

More than just mobile phones for Mali
by Don Dingee on 11-16-2015 at 12:00 pm

ARM TechCon 2015 was another tour de force for ARM and its ecosystem. Besides some of the developments in mobile, IoT, and security (more coming soon in the Epilogue of “Mobile Unleashed”), there were two topics that I found very educational and will cover in blogs this week. One was how the Mali family is powering more than just mobile… Read More


Xtensa Fusion DSP Target IoT including Wireless and Security

Xtensa Fusion DSP Target IoT including Wireless and Security
by Eric Esteve on 04-23-2015 at 8:30 am

Internet of Things (IoT) can be seen as a fashionable buzzword covering so many distinct applications that IoT is sometimes nick-named “Internet of Everything”, or it can be perceived as the next revolution in electronic systems generating more revenues than the smartphone and computer market together in 2020. But the industry… Read More


Getting up close and personal with symmetric session key exchange

Getting up close and personal with symmetric session key exchange
by Bill Boldt on 12-03-2014 at 2:00 am

columns1

In today’s world, the three pillars of security are confidentiality, integrity (of the data), and authentication (i.e. “C.I.A.”). Fortunately, Atmel CryptoAuthentication crypto engines with secure key storage can be used in systems to provide all three of these.

Focusing on the confidentiality pillar, in a symmetric system… Read More


ECDH Key Exchange is Practical Magic

ECDH Key Exchange is Practical Magic
by Bill Boldt on 10-28-2014 at 7:00 pm

nsa

What if you and I want to exchange encrypted messages? It seems like something that will increasingly be desired given all the NSA/Snowden revelations and all the other snooping shenanigans. The joke going around is that the motto of the NSA is really “Yes We Scan,” which sort of sums it up.

Encryption is essentially scrambling a
Read More


Wipe that smile off your device

Wipe that smile off your device
by Don Dingee on 07-30-2014 at 8:00 am

Privacy is a tough enough question when using a device – but what about when we’re done with it? In a world of two year service agreements with device upgrades and things being attached to long-life property like cars and homes, your data could fall into the hands of the next owner way too easily.

“Oh, it’s OK, I wiped the phone with a factory… Read More


Rekeying the IoT with eMTP

Rekeying the IoT with eMTP
by Don Dingee on 01-22-2014 at 4:10 pm

For non-volatile storage in IoT devices, there is technology designed to be reprogrammed many times, and technology designed to be programmed once. The many times mode is for application code, while the once mode is for keying and calibration parameters. We are about to enter the IoT rekeying zone, in between these two extremes.… Read More


Burst to the Cloud

Burst to the Cloud
by Paul McLellan on 09-29-2013 at 4:00 am

Very large datacenters have become economically attractive over the last decade. There are a several reasons for this. Virtualization and other software technologies have made it easier to make a datacenter look like a dedicated server, and at a much lower total cost of ownership of actually having your own dedicated server. … Read More