default banner

Secure Hash Algorithm (SHA)

Cryptographic hash functions used to check the integrity of a data published by the National Institute of Standards and Technology (NIST). There are several versions (SHA-2, SHA-256 or SHA-512) that define hash algorithms used by administrative authorities for signing certificates.

Security Science Factory (SSF)

Secure-IC's security laboratory and internal innovation engine

Side Channel Analysis (SCA)

Attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs). Timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information, which can be exploited. Some side-channel attacks require technical knowledge of the internal operation of the system, although others such as differential power analysis are effective as black-box attacks.

Side Channel Analysis for Reverse Engineering (SCARE)

New field of application for Side-Channel Attacks (SCA), that was recently introduced, following initial results on the GSM A3/A8 algorithm. The principle of SCARE is to use side-channel information (for instance, power consumption) as a tool to reverse-engineer some secret parts of a cryptographic implementation. SCARE has the advantage of being discrete and non-intrusive

Simple Power Analysis (SPA)

Special methodology to make side-channel attacks

SM2

Public key cryptographic algorithm based on elliptic curves, used for e.g. generation and verification of digital signatures

SM3

Cryptographic hash function mainly used in digital signatures, message authentication codes, and pseudorandom number generators.

SM4

Symmetric encryption algorithm, specifically a blockcipher, designed for data encryption

联系我们