skip to Main Content
Hacker

Secure Boot on Steroids

One of the biggest threats to the internet of things (IoT) is the installation of malicious software (malware) on IoT devices that changes the behavior of these devices to facilitate very specific attacks. This malware is often the first step…

Root of Trust Integration

OpenTitan: Transparency Leads to Greater Security

The statement in the title may seem counter-intuitive – aren’t most security systems based on propriety secrets? Yes, they are. These secrets are the cryptographic root keys on which the security of a system is built. However, this does not…

Banner Zign RNG square

An Unexpected IoT Problem: Not Enough Randomness

Author: Pim Tuyls, Founder & CEO | Originally published on EENews Europe A critical flaw in random number generators puts the security of billions of low-cost IoT devices at risk. This means a new approach for generating random numbers is…

NISTLogo

CAVP – NIST ACVTS – Are you still with me?

How “Acronym Soup” Serves Up Big Security Advantages. Let’s start at the top: NIST is the National Institute of Standards and Technology, a US government agency that promotes innovation and industrial competitiveness by advancing measurement science, standards, and technology. CAVP…

gold 4197439 1920 edited

A Device-Unique Fort Knox: Building a Key Vault for IoT Application Keys

Secure key storage is essential for internet-of-things (IoT) devices. Most IoT devices utilize multiple application-specific keys from diverse suppliers to enable applications such as authentication, message encryption, software/firmware encryption, to name just a few. Each application requires a different key…

Sven square

A Closer Look at QuiddiKey with Sven Goossens

Intrinsic ID is the world’s leading provider of security IP for embedded systems based on physical unclonable function, or PUF, technology. The technology provides an additional level of hardware security utilizing the inherent uniqueness in each and every silicon chip.…

Georgios edited2

Celebrating 5 years at Intrinsic ID: Georgios Selimis

Intrinsic ID has offices on three different continents and these offices are populated by colleagues from all around the globe. With a diverse team of driven and skilful professionals, Intrinsic ID is able to innovate the hardware security landscape with…

Back To Top