SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : WAVX Anyone?

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Paul Schmidt who wrote (4146)10/10/1998 10:27:00 AM
From: Marty Lee  Read Replies (2) of 11417
 
Paul.. Where do we fall in the greater scheme of things?

The article was educational. It didn't specifically address the features of security provided by hardware encryption residing on the client side. Our Wave Chip would seem to fit into the “attempt to be tamper-resistant hardware” category. Although our design does have a built in complementary security mechanisms just in case the tamper resistance fails.
The "timing attack… successfully implemented against smart cards and other security tokens, and against electronic commerce servers across the Internet” would seem to be countered by the Wave Chip's engineers having designed the code to move around the chip in different places and at different times smearing its own trail. Also, our Wave Chip casing might be “cracked” but only at the cost of erasing the information within (like breaking into a house with nothing in it). The article states, “Counterpane Systems and others have generalized these methods to include attacks on a system by measuring power consumption, radiation emissions, and other "side channels," and have implemented them against a variety of public-key and symmetric algorithms in "secure" tokens. We've yet to find a token that we can't pull the secret keys out of by looking at side channels. Related research has looked at fault analysis: deliberately introducing faults into cryptographic processors in order to determine the secret keys. The effects of this attack can be devastating.” Of course, we'll have to ask whether the article's authors have inspected the encryption machinery of a WAVX Meter and would want to bother with pulling out the secret keys in several million of them.

Sincerely,
Marty
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext