{"id":102588,"date":"2020-02-20T14:23:40","date_gmt":"2020-02-20T22:23:40","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2020\/02\/mixed-signal-hardware-security-thwarts-powerful-electromagnetic-attacks"},"modified":"2020-02-20T14:23:40","modified_gmt":"2020-02-20T22:23:40","slug":"mixed-signal-hardware-security-thwarts-powerful-electromagnetic-attacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2020\/02\/mixed-signal-hardware-security-thwarts-powerful-electromagnetic-attacks","title":{"rendered":"Mixed-signal hardware security thwarts powerful electromagnetic attacks"},"content":{"rendered":"<p><\/p>\n<p><iframe style=\"display: block; margin: 0 auto; width: 100%; aspect-ratio: 4\/3; object-fit: contain;\" src=\"https:\/\/www.youtube.com\/embed\/sh5_SWM7o_U?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope;\n   picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Security of embedded devices is essential in today\u2019s internet-connected world. Security is typically guaranteed mathematically using a small secret key to encrypt the private messages.<\/p>\n<p>When these computationally secure encryption algorithms are implemented on a physical hardware, they leak critical side-channel information in the form of power consumption or electromagnetic radiation. Now, Purdue University innovators have developed technology to kill the problem at the source itself\u2014tackling physical-layer vulnerabilities with physical-layer solutions.<\/p>\n<p>Recent attacks have shown that such side-channel attacks can happen in just a few minutes from a short distance away. Recently, these attacks were used in the counterfeiting of e-cigarette batteries by stealing the secret encryption keys from authentic batteries to gain market share.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security of embedded devices is essential in today\u2019s internet-connected world. Security is typically guaranteed mathematically using a small secret key to encrypt the private messages. When these computationally secure encryption algorithms are implemented on a physical hardware, they leak critical side-channel information in the form of power consumption or electromagnetic radiation. Now, Purdue University innovators [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1625,41,418,1492],"tags":[],"class_list":["post-102588","post","type-post","status-publish","format-standard","hentry","category-encryption","category-information-science","category-internet","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/102588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=102588"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/102588\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=102588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=102588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=102588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}