Page 59 - EE Times Europe Magazine – November 2023
P. 59

EE|Times EUROPE   59

                         U.K. Conference Accelerates Post-Quantum Cryptography Standards Review Process








                                                                                 For reader inquiries and address changes,
                                                                                 please contact: christiane.lockner@aspencore.com
                                                                                 To unsubscribe, please go to:
                                                                                 www.eetimes.eu/unsubscribe/



                                                                                 Aspencore Media GmbH
                                                                                 Frankfurter Straße 211
                                                                                 63263 Neu-Isenburg
                                                                                 Germany
                                                                                 EE TIMES EDITORIAL MANAGEMENT
                                                                                 Brett Brune, Editor-in-Chief, EE Times,
                                                                                 brett.brune@aspencore.com
                                                                                 Anne-Françoise Pelé, Editor-in-Chief, EE Times Europe,
                                                                                 afpele@aspencore.com
                                                                                 Echo Zhao, Chief Analyst, echo.zhao@aspencore.com
                                                                                 Yorbe Zhang, Head of AspenCore APAC,
                                                                                 yorbe.zhang@aspencore.com
        A power analysis attack on an embedded system running a cryptographic algorithm with-  GLOBAL ASPENCORE EDITORS
        out countermeasures, according to NIST’s FIPS 140-3 certification (Source: PQShield)  Matthew Burgess, matthew.burgess@aspencore.com
                                                                                 Anthea Chuang, anthea.chuang@aspencore.com
                                                                                 Nitin Dahad, nitin.dahad@aspencore.com
                                                                                 Maurizio Di Paolo Emilio,
        in the future. “The two things we see at the                             maurizio.dipaolo@aspencore.com
        moment are quantum computing and AI,” he                                 Yvonne Geng, yvonne.geng@aspencore.com
                                                                                 Amy Guan, amy.guan@aspencore.com
        said. “Quantum computing has a clear way to                              Susan Hong, susan.hong@aspencore.com
        break existing algorithms, and we have a clear                           Illumi Huang, illumi.huang@aspencore.com
        methodology to defend against it. However,                               Barbara Jorgensen, barb.jorgensen@aspencore.com
                                                                                 Majeed Ahmad Kamran, majeed.kamran@aspencore.com
        AI still needs to be clarified [as to] what it can                       Clover Lee, clover.lee@aspencore.com
        do, and this is something to keep an eye on.                             Shao Lefeng, lefeng.shao@aspencore.com
                                                                                 Jenny Liao, jenny.liao@aspencore.com
        We need to use AI to our benefit to build more                           Elaine Lin, elaine.lin@aspencore.com
        secure encryption methods and build better                               Luffy Liu, luffy.liu@aspencore.com
        side-channel countermeasures.”                                           Stefani Muñoz, stefani.munoz@aspencore.com
                                                                                 Challey Peng, challey.peng@aspencore.com
          PQShield has a team of cryptographic                                   Gina Roos, gina.roos@aspencore.com
        professionals engaged in playing the role of                             Fendy Wang, fendy.wang@aspencore.com
                                                                                 Sally Ward-Foxton, sally.wardfoxton@aspencore.com
        attackers, he said. “They’re trying to attack   PQShield’s Axel Poschmann  Demi Xia, demi.xia@aspencore.com
        our own post-quantum products with various                               Franklin Zhao, franklin.zhao@aspencore.com
                                                                                 Momo Zhong, momo.zhong@aspencore.com
        methods. Post-quantum cryptography has   the test lab. He noted some of the counter-
        been in an academic setting for decades now,   measures the researchers use to protect   CONTRIBUTING EDITORS
                                                                                 Pat Brans, pdbrans@gmail.com
        but it hasn’t been in an industrial environ-  post-quantum cryptography products from   Robert Huntley, robert@seventyfourhundred.com
        ment for that time. There are many different   side-channel attacks, such as masking.  Saumitra Jagdale, saumitra@opencloudware.com
        industrial attack surfaces that adversaries   “TVLA is widely recognized as a robust and   Egil Juliussen, egil@norskeagle.com
                                                                                 Stefano Lovati, slovati@gmail.com
        can use, and that’s how you can stay ahead of   reliable test methodology and is part of NIST   Rebecca Pool, editorial@rebeccapool.com
        them—by building a group to do that work.”  FIPS 140-3 Security Certification require-  Anton Shilov, ashilov@gmail.com
                                            ments,” Poschmann said. “At PQShield, we use   Ann Thryft, athryft@earthlink.net
        SIDE-CHANNEL ATTACKS SET TO RISE    it because it is very suitable for automation   PRODUCTION
        It was clear from the discussions with El   and easily integrated into our continuous   Adeline Cannone, Design Director,
                                                                                 adeline@cannone.com
        Kaafarani that there were real concerns over   integration and continuous deployment   Lori O’Toole, Chief Copy Editor, lotoole@aspencore.com
        side-channel attacks. Coupling the power of   development environment. This allows us to   Diana Scheben, Senior Copy Editor,
        AI to analyze vast amounts of data gathered   run tests overnight and analyze them in the   diana.scheben@aspencore.com
        from a side-channel attack method, such   morning, enabling rapid improvement cycles   SALES & MARKETING
        as differential power analysis, is something   that yield much more secure products.”  Christiane Lockner, christiane.lockner@aspencore.com
                                                                                 The Hufmann Agency, victoria@hufmann.info,
        PQShield takes seriously, he said. “In terms   Poschmann demonstrated a power analysis   norbert@hufmann.info
        of products, we also have the most advanced   attack on an embedded system running a   Todd Bria, todd.bria@aspencore.com
        side-channel countermeasures that have been   cryptographic algorithm without counter-  Cyrus Krohn, Vice President, Publisher — AspenCore
        applied to our products and have been already   measures (unmasked) and explained a   Copyright© All rights reserved. No part of this publication
        licensed to customers.”             screen-captured image: “The red line is the   may be reproduced or transmitted in any form or by any
                                                                                 means  without  the  prior  express  written  permission  of
          EE Times Europe met PQShield’s head   security assurance threshold set by the    AspenCore Media. Although we make every effort to present
        of product innovation and security, Axel   ISO 17825 standard, which NIST’s FIPS 140-3   up-to-date, accurate information, EE Times Europe will not
                                                                                 be responsible for any errors or omissions or for any results
        Poschmann, in his test lab in Oxford. Sur-  certification is based on. This threshold   obtained from the use of such information. The magazine
        rounded by a bank of embedded platforms,   is currently being raised, which PQShield   will not be li able for any loss caused by the reliance on
                                                                                 information obtained on this site. Furthermore, EE Times
        one of which was inside a Faraday cage,   has accounted for, but as the red line was   Europe  does  not  warrant  the  accuracy  or  completeness
        Poschmann explained the role of test vector   exceeded in this test, the unmasked algorithm   of the information, text, graphics in this magazine. The
                                                                                 opinions expressed in the articles are those of the authors
        leakage assessment (TVLA) methods in   has failed.” ■                    and not necessarily the opinions of the publisher.
                                                                                   www.eetimes.eu | NOVEMBER 2023
   54   55   56   57   58   59   60   61   62   63   64