Identification Category

Wow, that headline sounds dramatic. Will we really need to battle our own connected kitchen appliances, smartwatches and printers at some point? To answer this questions let’s assess some recent events. Taking Out Some Of The Most Frequently Visited Internet Services With One Attack Just a few weeks back a Distributed Denial of Service (DDoS) attack on Domain Name System (DNS) service provider DynDNS caused a major outage of a number of well-known internet pages and brands (e.g. Amazon, PayPal, Spotify, Soundcloud, Twitter). For those not familiar with the termRead More
Android Smartphone
Business emails, private photos and important documents – users tend to store sensitive data on their smartphones creating the need for privacy and security solutions on the devices. Therefore Apple and Google protect your data with full disk encryption (FDE) on iOS and Android products. This protection of all data stored on our phones is usually achieved by using a passcode which you need to enter to unlock the device. To the user the solutions of Apple and Google appear very similar. On both systems it is possible to setRead More
Yes, the IoT will spark billions of new connections. Yes, there will be tons of unattended and autonomous devices connected to the internet that need to be secured. And yes everybody knows it. So why do we still see headlines about hacks popping up on a daily basis? Because implementing security isn’t easy nor is it cheap. Semiconductor manufacturers have understood this problem and are developing solutions in order to supply components that enable cost efficient and effortless implementation of protective features into applications. The latest “weapon” for the fightRead More
Mercedes-Benz E-Class, KEYLESS-GO Paket
Just a couple weeks ago we described how digital keys equipped with crypto hardware could be used to secure the communication between all kinds of locks and devices. However instead of adding safety modern car keys are often a security risk if the vehicles are equipped with technology for “keyless go”. This feature enables the owner to open a vehicle while leaving the key in the pocket and even start the car without getting it out. Now that’s comfy – for you and for thieves. The reason is the wayRead More
embedded security

Posted On March 15, 2016By Christian JakobIn Identification, Security Blog

IT Security for Embedded Systems

Various markets discovered the Internet of Things (IoT) for themselves and develop more and more products and devices. There are areas like Smart Grid, Connected Car, Smart Home & Building, personal health & fitness, or Smart Factory and Industry 4.0. Each of the subjects offer plenty to talk about in separate blog articles. But there is one thing that all of them have in common. And that is supposed to be the topic of this article: Security for the Internet of Things. Facing Increasing Security Needs So when we talkRead More
TLS & Induytry 4.0 / IoT
Secure communication is a prerequisites for Industry 4.0 applications. That bold statement becomes even clearer if we compare the impact of a hacker attack on personal, private IoT applications and industrial IoT (IIoT) applications. Malicious access to your personal email account is bad news for you and in case of your business mails for the department you are working for. A successful attack on a company however can cause big losses through espionage, cloning or slowed down production – which will eventually be bad news for a lot of peopleRead More
For the Identification Segment 2015 has been as exciting as it gets – we have seen some major highlights, security flaws, hacker attacks and remarkable new semiconductor solutions. The IoT is still the defining market trend but there have been several other happenings under the huge roof of the interconnectivity of everything which are well worth taking a look back on.  This year’s huge demand from diverse customers for IoT solutions accelerated the number of new industrial microcontrollers with integrated security features on board. In addition, we have seen theRead More
After last years hype around IoT technology two things became clear: IoT is the defining trend of the next years and security is a major challenge within it. While security software might be sufficient in some cases there is usually no way around implementing security hardware in applications in order to add the necessary protection to a device.   Having said that, there is the next issue: Affordability of security hardware. Security chips will only be implemented into products if the required expenses and efforts are reasonable. Solutions which create aRead More
A crypto system should be secure even if everything about the system, except the key, is public knowledge – Kerckhoff’s law (from the 19th century). There are two basic ways of security systems: symmetric and asymmetric.  Both rely on Kerhoff’s law using secret keys to ensure security. Symmetric systems use the same key on host and client side and offer fast and high throughput as well as efficient security implementation. At the same time symmetric security comes with the trade-off that once a key becomes public the system is not safeRead More
Two weeks ago we defined several questions to find out if your application needs security. Now it’s time to think about what to consider when protecting a system. We created an infographic examining the 6 most important questions. The key to security is defining the perfect mixture of hardware and software security measures in order to keep the system safe and to minimise the expenses for protection. To do so you need to implement security into your design from the beginning and think of possible attacks and vulnerabilities of yourRead More