by Max Maxfield
As I mentioned in my Cyber Insecurity column a few days ago, any system is only as secure as its weakest link. In order to protect a system, we need a layered approach to secure:
The Hardware: DPA resistance, NIST-certified crypto accelerators, a secure supply chain, etc.
The Data: Key storage using physically unclonable function (PUFs), advanced crypto accelerators, DPA resistance, etc.
Continue reading on EE times