Welcome to My New 網誌 Blog
1. Introduction Generally speaking IoT/AIoT networks require strong identification /authentication, secure update, secure boot, secure communication, and data encryption for IoT devices . Typically, the IoT device logs in on its own and sends data on its own. Consequently, authenticating the potentially billions of IoT devices to the server and among themselves becomes a big concern. Thus, securing… Read more
PUFsecurity’s chip security co-processor IP, PUFiot, has passed the CAVP certification. The certified security algorithms include AES, CMAC, DRBG, key wrap, SHA2, HMAC, KDF, and ECDSA. This good news means that PUFiot officially qualifies under international security standards to further meet the security needs of various application scenarios; a guarantee for chips and systems that use PUFiot. The Cryptographic Algorithm Validation Program (CAVP) is established by the National… Read more
Follow My Blog
Get new content delivered directly to your inbox.