Thanks for presenting this and having it on archive so I can catch up on the weekend.
I think the level of presentation was very good given the time allowed. This was heavy on Microsemi, but I do not find that a problem since it presents a real world part. Other vendors FAE's should be able to offer suitable components for specific applications.
Regarding software tools, I strongly prefer vendor tools. The vendors are selling 100's of thousands of components on a successful design and the FAE's will provide good support. Other tool vendors do not have that strong an incentive.
?? Engineering news articles and YouTube videos show skilled hackers STILL able to intercept traffic from over the air. Does anyone know whether the cell security measures are fully enabled in 2G, 3G networks? Or will they be in 4G networks?
?? About cell networks. I asked about this a few days back. I'm working on some designs that pass data over the cell network. I asked some people that support the chipsets that interface to the networks, and they suggested encryption is provided for in the cell standards. But it is unclear whether it is actually turned on and in use, say on AT&T or other carriers. I've also heard of provisions in the cell stack for detecting a corrupted data stream arriving at a modem.
@drw- You don;t need a seperate layer, but that can provide additional board coverage if you have the luxury. Usually just routing the temperdetection around on available space and making sure to cross back and forth over critical interface signals is enough. It's not a fool-proof method, but typically very low cost...
In a previouss post I mentioned "Don't superencrypt ROT13 with ROT13." it was meant as a bit of humor:,however, it might solve your problem of reading encrypted data patterns and making sense of them. ROT13 is simply substituting M for A (13 letters away in the alphabet), N for B, and so on. This constitutes the first encryption. If you do it again the same way (superencryption) then you get A for M, B for N , and so on - effectively restoring the plain text!
@SLB- Yep, I find the time needed (in particular for the programming assignments) is estimated way low. I suggest you don;t actually take the course the first time and just do the lectures at your own pace. Then come back and do it for real if you thnk its worth the effort...
@drw36: My boards usually don't have the luxury (or cost margin) to allow adding layers for a purpose like that. But maybe routing the tamper line all around (so far as possible) the signals if interest.
?? One problem that I've faced with securing a system - when the data is encrypted, I cannot recognize my own data patterns. Say a familiar byte sequence - once encrypted, it doesn't look familiar. I often have to turn off the encryption while debugging. At some point that won't be possible. How do others deal with this?
@CPU- You can make the tamper detection more complex however. the idea of sending tokens across instead od a static signal is a good one. You might be able to better detect some side-channel attacks that way...
?? Warren please describe that PCB tamper detection mesh some more. (Slide 12) Is this like a daisy-chained signal passing thru various processing elements? Or point-to-point signals that pairs of chips must share? Are some kind of data tokens passed over these lines? Can you point to any examples of circuit implementations?
To stay up on new industry trends: Emails announcing products... read new press releases, data sheets. Videos are helpful to speed up & eliminate having to search thru documents. Also training like this.
Hi all -Audio is live! If you don't see the audio bar at the top of the screen, please refresh your browser. It may take a couple tries. When you see the audio bar, hit the play button. If you experience audio interruptions and are using IE, try using FF or Chrome as your browser. Many people experience issues with IE. Also, make sure your flash player is updated with the current version. Some companies block live audio streams, so if that is the case for your company, the class will be archived on this page immediately following the class and you can listen then. People don't experience any issues with the audio for the archived version.
I missed yesterday's class (nice, sunny 61 degree F day had nothing to do with it!!) I cannot seem to download the audio file. Anybody else have a similar problem? I can hear the file online, but I like to listen to it offline and review the slides/make notes, etc.
@Huntwork- There are a few algorithms that ca be used. Check out the online classes or dig into a book like "An Introduction to Mathematical Cryptpgraphy", by Hollstein, Pipher and Silverman, published by Springer for the mathematical details. Or you can just use a canned program and not worry about the 'how'...
?? @Warren. I agree with @WillP and @eortheain that homework was helpful. I am still missing a piece, though. How do you recommend calculating the Modular Multiplicative Inverse? Do you use the Extended Euclidean Algorithm or another method?
Warren - I worked on Wednesday's cryptography homework. I thought it was VERY helpful to work through some actual numbers... to get a better feel for what's really going on under the covers with this stuff. Thanks for providing that!
The streaming audio player will appear on this web page when the show starts at 2 PM Eastern time today. Note however that some companies block live audio streams. If when the show starts you don't hear any audio, try refreshing your browser. If that doesn't work, try using Firefox or Google Chrome as your browser. Some users experience audio interruptions with IE. If that doesn't work, the class will be archived immediately following our live taping.
The 100% solar-powered airplane Solar Impulse 2 is prepping for its upcoming flight, becoming the first plane to fly around the world without using fuel. It's able to do so because of above-average performance by all of the technologies that go into it, especially materials.
With major product releases coming from big names like Sony, Microsoft, and Samsung, and big investments by companies like Facebook, 2015 could be the year that virtual reality (VR) and augmented reality (AR) finally pop. Here's take a look back at some of the technologies that got us here (for better and worse).
Good engineering designs are those that work in the real world; bad designs are those that don’t. If we agree to set our egos aside and let the real world be our guide, we can resolve nearly any disagreement.
Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.