embedded security
Various markets discovered the Internet of Things (IoT) for themselves and develop more and more products and devices. There are areas like Smart Grid, Connected Car, Smart Home & Building, personal health & fitness, or Smart Factory and Industry 4.0. Each of the subjects offer plenty to talk about in separate blog articles. But there is one thing that all of them have in common. And that is supposed to be the topic of this article: Security for the Internet of Things. Facing Increasing Security Needs So when we talkRead More
TLS & Induytry 4.0 / IoT
Secure communication is a prerequisites for Industry 4.0 applications. That bold statement becomes even clearer if we compare the impact of a hacker attack on personal, private IoT applications and industrial IoT (IIoT) applications. Malicious access to your personal email account is bad news for you and in case of your business mails for the department you are working for. A successful attack on a company however can cause big losses through espionage, cloning or slowed down production – which will eventually be bad news for a lot of peopleRead More
For the Identification Segment 2015 has been as exciting as it gets – we have seen some major highlights, security flaws, hacker attacks and remarkable new semiconductor solutions. The IoT is still the defining market trend but there have been several other happenings under the huge roof of the interconnectivity of everything which are well worth taking a look back on.  This year’s huge demand from diverse customers for IoT solutions accelerated the number of new industrial microcontrollers with integrated security features on board. In addition, we have seen theRead More
After last years hype around IoT technology two things became clear: IoT is the defining trend of the next years and security is a major challenge within it. While security software might be sufficient in some cases there is usually no way around implementing security hardware in applications in order to add the necessary protection to a device.   Having said that, there is the next issue: Affordability of security hardware. Security chips will only be implemented into products if the required expenses and efforts are reasonable. Solutions which create aRead More
Got internet? Then you will probably have read about the Jeep Cherokee hack performed by Charlie Miller (Security Engineer, Twitter) and Chris Valasek (Director of Vehicle Safety Research, IOActive) while Andy Greenberg (Senior Writer, Wired) was driving. If not watch the video below! The two hackers have been able to access the car wirelessly and to perform highly dangerous tasks like disabling the brakes and cutting off the engine. Even more concerning, Miller and Valasek claim that it would easily be possible to hack nearly any other 2014/2015 Chrysler model equippedRead More
Here is what everyone tells you: Security in the Internet of Things (IoT) is vitally important. Wonder why exactly you should personally be interested in companies implementing security in new devices and applications? The infographic below gives a pretty straight forward explanation. Source: ComputerScienceZone.orgRead More
A crypto system should be secure even if everything about the system, except the key, is public knowledge – Kerckhoff’s law (from the 19th century). There are two basic ways of security systems: symmetric and asymmetric.  Both rely on Kerhoff’s law using secret keys to ensure security. Symmetric systems use the same key on host and client side and offer fast and high throughput as well as efficient security implementation. At the same time symmetric security comes with the trade-off that once a key becomes public the system is not safeRead More
Two weeks ago we defined several questions to find out if your application needs security. Now it’s time to think about what to consider when protecting a system. We created an infographic examining the 6 most important questions. The key to security is defining the perfect mixture of hardware and software security measures in order to keep the system safe and to minimise the expenses for protection. To do so you need to implement security into your design from the beginning and think of possible attacks and vulnerabilities of yourRead More