Is this thing real? Symmetric authentication will tell you!

Is this thing real? Symmetric authentication will tell you!
by Bill Boldt on 07-01-2014 at 6:00 pm

The act of authentication is very straightforward. Essentially, it is making sure that something is real.

There are two parts to authentication:

[LIST=1]

  • Identification
  • Confirmation of identity

    Authentication in the “crypto-verse” typically happens on a host and client basis where the host wants to ensure that a client is

  • Read More

    What is Authentication and Why Should You Care?

    What is Authentication and Why Should You Care?
    by Bill Boldt on 06-18-2014 at 10:00 pm

    Authentication means making sure that something is real, just like it sounds.In the real world, authentication has many uses. One of the most recognizable is anti-counterfeiting, which means validating the authenticity of a removable, replaceable, or consumable client. Examples include system accessories, electronic Read More


    On-chip Firewall

    On-chip Firewall
    by Paul McLellan on 04-22-2014 at 8:00 am

    We have had the Snowden revelations that the NSA has gone rogue, Target lost a zillion credit cards, the Heartbleed bug meaning that main security protocol of the internet had been coded up wrong for a couple of years, theft of records from RSA and more. One result is that people do not completely trust a security system that depends… Read More


    Can the NSA Get Into Your Chip?

    Can the NSA Get Into Your Chip?
    by Paul McLellan on 04-21-2014 at 2:49 am

    At DVCon Lawrence Loh and Viktor Markus Purri gave a tutorial on Formally Verifying Security Aspects of SoC Designs. Lawrence is the direector of WW application engineering and Markus is an FAE who specializes in security verification.

    I’m not going to attempt to summarize an entire half-day tutorial in under 1000 words,… Read More


    Imagine what all the DLP technology can do for you

    Imagine what all the DLP technology can do for you
    by Pawan Fangaria on 03-24-2014 at 7:00 pm

    Light has become integral part of most of the electronic devices we use today in any sphere of influence; personal, entertainment, consumer, automotive, medical, security, and industrial and so on. It’s obvious; along with IoT (Internet-of-Things) devices, the devices to illuminate and display things will play a major role… Read More


    DAC: Automotive, IP and Security

    DAC: Automotive, IP and Security
    by Paul McLellan on 03-21-2014 at 5:18 pm

    DAC is in the first week of June in San Francisco as I’m sure you already know if you are reading this. Historically DAC has focused on electronic design automation (EDA) and embedded software and systems (ESS). This year there are three new areas: automotive, Intellectual Property (IP) and security.

    Automotive
    Ever increasing… Read More


    Smart cards hard for the US to figure out?

    Smart cards hard for the US to figure out?
    by Don Dingee on 02-18-2014 at 3:30 pm

    Every once in a while, I just scratch my head and wonder just what in the wide, wide world of tech is going on. More than ever, it seems the big barriers to adoption aren’t a lack of technology – instead, barriers come from a system that staunchly defends the old way of doing things, even when the participants are battered, broken, and … Read More


    Rekeying the IoT with eMTP

    Rekeying the IoT with eMTP
    by Don Dingee on 01-22-2014 at 4:10 pm

    For non-volatile storage in IoT devices, there is technology designed to be reprogrammed many times, and technology designed to be programmed once. The many times mode is for application code, while the once mode is for keying and calibration parameters. We are about to enter the IoT rekeying zone, in between these two extremes.… Read More


    NoC, NoC: Your Chip May Be Under Attack

    NoC, NoC: Your Chip May Be Under Attack
    by Paul McLellan on 01-03-2014 at 12:37 pm

    SoCs face a lot of issues related to security and the Network-on-Chip (NoC) is in a good position to facilitate system-wide services. SoCs are now so complex that one of the challenges is to make sure that the chip does what it is meant to do and doesn’t do what it isn’t meant to do. Just as in software, security used to be … Read More


    Somebody at the NSA has a sense of humor

    Somebody at the NSA has a sense of humor
    by Don Dingee on 01-02-2014 at 6:30 pm

    We have to go way back in the annals of entertainment history to find the origin of the word “Jeep”, not just a term of endearment hung on a WWII utility vehicle. Pictured is Eugene the Jeep, a mystical creature belonging to the 4th Dimension, who first appeared to torment Popeye the Sailor in 1936.… Read More