Welcome!

News Feed Item

Cryptography Research and Entropic Sign License Agreement for DPA Countermeasures to Secure Next Generation Content

Cryptography Research, the security division of Rambus (NASDAQ:RMBS), and Entropic (NASDAQ:ENTR), a world leader in semiconductor solutions for the connected home, today announced they have signed a patent license agreement allowing for the use of the Cryptography Research side-channel attack countermeasures in Entropic’s integrated circuits. The Cryptography Research patented technology will protect Entropic’s set-top box system-on-a-chip (SoC) products against differential power analysis (DPA) and related attacks. This agreement builds on the previous agreement between the two companies with Entropic already licensing the Cryptography Research CryptoFirewall™ tamper-resistant core for set-top boxes.

“While high value content enhances the Pay-TV experience, it also carries with it substantial risk for our OEM and Service Provider customers,” said Matt Rhodes, senior vice president, Global Marketing, Entropic. “Today’s premium programming requires strong protection systems and CRI’s DPA countermeasure technology provides an essential foundation for any Conditional Access or Digital Rights Management system.”

“The market demands for protection against non-invasive side channel attacks such as DPA have grown with the continued rise of high quality content,” said Paul Kocher, chief scientist of the Rambus Cryptography Research division. “Entropic has been a terrific partner for our CryptoFirewall technology and is once again taking a leadership role in deploying strong content protection technology in the set-top box SoC market.”

Using DPA, attackers can measure the power consumption of a set-top box chip to extract secret cryptographic keys stored within the set-top box. The discovery of secret keys undermines the security of set-top boxes within a service provider’s network and can result in the theft of valuable, high-quality content and services as well as leaving other data like personal information vulnerable. Set-top box SoCs that contain DPA countermeasures prevent the power consumption analysis through a series of techniques to ultimately protect the secret keys of a set-top box from being discovered.

Side channel and DPA attacks are non-invasive attacks that involve monitoring the fluctuating electrical power consumption of a target device and then using advanced statistical methods to derive cryptographic keys and other secrets. Strong countermeasures to these attacks help protect tamper-resistant products used in applications such as banking, pay television, mass transit, secure ID, and wireless telecommunications.

For additional information on DPA Countermeasures, CryptoFirewall or on Cryptography Research visit cryptography.com.

About Entropic

Entropic™ (Nasdaq:ENTR) is a world leader in semiconductor solutions for the connected home. The Company transforms how traditional HDTV broadcast and IP-based streaming video content is seamlessly, reliably, and securely delivered, processed, and distributed into and throughout the home. Entropic's next-generation Set-top Box (STB) System-on-a-Chip (SoC) and Connectivity solutions enable Pay-TV operators to offer consumers more captivating whole-home entertainment experiences by transforming the way digital entertainment is delivered, connected and consumed – in the home and on the go. For more information, please visit Entropic at: www.entropic.com, read our blog Entropic Topics, or get social with us at @Entropic_News, or on Facebook, Google+, YouTube and LinkedIn.

About Cryptography Research, Inc.

Cryptography Research, Inc. (CRI), a division of Rambus Inc., is a leader in semiconductor security research and development. Established by internationally renowned cryptographer Paul Kocher, CRI develops and licenses innovative technologies in areas including tamper resistance, content protection, anti-counterfeiting, network security, and financial services. Over seven billion security products are made each year under license from CRI. Security systems designed by CRI scientists and engineers protect hundreds of billions of dollars in commerce annually. Additional information is available at: cryptography.com.

Forward Looking Statements

Statements in this press release that are not strictly historical in nature constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Such statements include, but are not limited to, statements regarding Entropic's SoC technologies, its related prospects and its role in the future of connected home entertainment. Such forward-looking statements involve known and unknown risks, uncertainties and other factors, which may cause Entropic's actual results to be materially different from historical results or from any results expressed or implied by such forward-looking statements. These factors include, but are not limited to, competition, risks associated with Entropic dependence on a limited number of customers and suppliers, technology risks, the risk that the market for HD video and multimedia content delivery solutions may not develop as Entropic anticipates and other factors discussed in the "Risk Factors" section of Entropic's Quarterly Report on Form 10-Q for the quarter ended March 31, 2014. All forward-looking statements are qualified in their entirety by this cautionary statement. Entropic is providing this information as of the date of this release and does not undertake any obligation to update any forward-looking statements contained in this release as a result of new information, future events or otherwise.

Copyright© 2014 Entropic. All rights reserved. All other product or company names mentioned are used for identification purposes only and may be trademarks of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
WebSocket is effectively a persistent and fat pipe that is compatible with a standard web infrastructure; a "TCP for the Web." If you think of WebSocket in this light, there are other more hugely interesting applications of WebSocket than just simply sending data to a browser. In his session at 18th Cloud Expo, Frank Greco, Director of Technology for Kaazing Corporation, will compare other modern web connectivity methods such as HTTP/2, HTTP Streaming, Server-Sent Events and new W3C event APIs ...
SYS-CON Events announced today that AppNeta, the leader in performance insight for business-critical web applications, will exhibit and present at SYS-CON's @DevOpsSummit at Cloud Expo New York, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. AppNeta is the only application performance monitoring (APM) company to provide solutions for all applications – applications you develop internally, business-critical SaaS applications you use and the networks that deli...
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, will give users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion w...
Join us at Cloud Expo | @ThingsExpo 2016 – June 7-9 at the Javits Center in New York City and November 1-3 at the Santa Clara Convention Center in Santa Clara, CA – and deliver your unique message in a way that is striking and unforgettable by taking advantage of SYS-CON's unmatched high-impact, result-driven event / media packages.
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
SYS-CON Events announced today that (ISC)²® (“ISC-squared”) will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Two leading non-profits focused on cloud and information security, (ISC)² and Cloud Security Alliance (CSA), developed the Certified Cloud Security Professional (CCSP) certification to address the increased demand for cloud security expertise due to rapid growth in cloud. Recently named “The Next...
The Art of DevOps provides a fun overview to help teams understand DevOps. Written in the style of the famous 6th century Chinese manuscript “The Art of War,” this eBook describes DevOps in the form of a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly. It’s a fun read with valuable insights.
Advances in technology and ubiquitous connectivity have made the utilization of a dispersed workforce more common. Whether that remote team is located across the street or country, management styles/ approaches will have to be adjusted to accommodate this new dynamic. In his session at 17th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., focused on the challenges of managing remote teams, providing real-world examples that demonstrate what works and what do...
As someone who has been dedicated to automation and Application Release Automation (ARA) technology for almost six years now, one of the most common questions I get asked regards Platform-as-a-Service (PaaS). Specifically, people want to know whether release automation is still needed when a PaaS is in place, and why. Isn't that what a PaaS provides? A solution to the deployment and runtime challenges of an application? Why would anyone using a PaaS then need an automation engine with workflow ...
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an international cloud security credential that reflects the most current and comprehensive best practices for securing and optimizing cloud computing environments.