default banner

Public Key Infrastructure (PKI)

Set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email.

Register-Transfert Level (RTL)

Design abstraction which models a synchronous digital circuit in terms of the flow of digital signals (data) between hardware registers, and the logical operations performed on those signals. Register-transfer-level abstraction is used in hardware description languages (HDLs) like Verilog and VHDL to create high-level representations of a circuit, from which lower-level representations and ultimately actual wiring can be derived.

Replay attack

Form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed

RISC-V

Open and free 64-bit RISC instruction set architecture (ISA), i.e. with open specifications that can be freely used by education, research and industry. It also refers to a processor using this instruction set.

Root of Trust (RoT)

Highly reliable hardware, firmware, and software components that perform specific, critical security functions. Because roots of trust are inherently trusted, they must be secure by design. Roots of trust provide a firm foundation from which to build security and trust.

RSA (Rivest–Shamir–Adleman)

Public-key cryptosystem that is widely used for secure data transmission. In RSA, the encryption key is public and distinct from the decryption key, which is kept secret (private). An RSA user creates and publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers are kept secret. Messages can be encrypted by anyone, via the public key, but can only be decoded by someone who knows the prime numbers.

Secure Hash Algorithm (SHA)

Cryptographic hash functions used to check the integrity of a data published by the National Institute of Standards and Technology (NIST). There are several versions (SHA-2, SHA-256 or SHA-512) that define hash algorithms used by administrative authorities for signing certificates.

Security Science Factory (SSF)

Secure-IC's security laboratory and internal innovation engine

联系我们