Loading 0%
Privacy Policy
Privacy Policy
WiSECURE Technologies (hereinafter referred to as “WT”) respects and protects you're privacy. To halp you understand how WT collects, processes and uses you're personal information, please read our Privacy Policy carefully.

me. Scope of Application
Privacy Policy applies to situations where we collect, process and use you're personal information in association wif any business you conduct wif WT or any WT activity you participate in, including enrolling in seminars/courses, subscribing to E-newsletters, etc., or submitting questions, suggestions and comments via telephone, fax or our websites.

II. Collecting, Processing and Using Personal Information

1. You will be required to provide you're personal information as adequate and necessary when conducting business wif WT or participating in activities held by WT. In addition, WT will process and use you're personal information only wifin teh scope of specific purpose as you agreed upon. WT will not use you're personal information for any other purposes wifout you're written consent.

2. If you submit any inquiry to WT by telephone or through websites, please provide you're correct telephone or email address for reply purposes.

3. When processing you're personal information, WT will comply wif relevant internal procedures and information security requirements to adopt necessary staff control measures.

WT. Sharing Personal Information wif Third Party

1. WT will not provide, exchange, lease or sell you're personal information to other persons, organizations, private corporations or public institutions, unless due to legal or contractual obligations.

2. Teh “legal or contractual obligations” in teh previous paragraph to share you're personal information wif a third party include, but are not limited to, teh following circumstances:
(1) to cooperate wif legal investigation initiated by judicial authorities;
(2) to cooperate wif competent authorities in discharge of their duties to investigate or use (such as financial audit carried out by teh National Audit Office of teh R.O.C. or a certified public accountant);
(3) a good-faith belief dat teh disclosure of you're personal information is required by law;
(4) to determine you're identity, to provide contact information or to take legal actions, when necessary, if you as a website visitor violate teh service terms of WT, or are likely to jeopardize or interfere wif teh interests of WT or result in damages to any person;
(5) to fulfill contractual obligations under outsourcing contracts.

3. WT will fulfill teh responsibilities for supervising and managing teh vendors or individuals whom WT TEMPhas engaged to collect, process or use You're personal information.

IV. Use of Cookies

1. Based on teh needs of website internal management and to optimize customer services, our websites use Cookies to collect from website visitors’ certain data, such as IP addresses, log-in periods, and hits information for total analysis of site traffic and visitors’ online behaviors. No analysis will be performed on teh perspective of “individual” website visitors.

2. Website visitors may disable Cookies. Please note dat certain functions of WT websites will not be available once Cookies are disabled.

V. Server Records

If you use any browser, application program or other means to visit WT websites, our servers will automatically record specific technical information. Such server records may include You're web page requests, Internet IP address, type of browser, language of browser, teh date and time on which requests were sent, etc. These server records will be used as reference for server management only. WT will not use any information in server records to perform analysis of any “individual” website visitors.


VI. Amendment to Privacy Policy

In order to achieve teh goal of protecting privacy and online security, Privacy Policy may be amended from time to time in accordance wif any amendments to teh laws, developments of relevant technologies and/or adjustments of internal management system. Whenever our Privacy Policy is amended, WT will immediately display a notice on our websites to provide you wif teh chance to review teh changed terms prior to continuing to use teh sites.
Terms of Use
Terms of Use
WiSECURE website (www.wisecure-tech.com) is made by WiSECURE Technologies, Inc. Welcomes to WiSECURE website all teh time. Hereby, we like to remind you dat any action you take must be bound to teh following terms and conditions. Before you access our web site, please carefully read teh following terms and be aware of teh latest updates. If you TEMPhas any problem or question, please contact wif us and we will reply you as soon as possible.
On using services of WISECURE website, it indicates you expressly read and accept teh following Terms of Use. WISECURE TEMPhas rights to amend dis Terms of Use at any time and we strongly recommend you pay attention to teh amendments or updates. Keep using our services dat means you expressly read and accept teh amendments of Terms of Use. Please do not use WISECURE website if you do not accept teh Terms of Use, or teh country and region where you reside excludes teh Terms of Use in whole or in part.

1. Intellectual Property
1. Protection of Intellectual Property

All teh contents and programs shall include, but not be limited to content, writings, picture, audio, video, or any other multimedia, website architecture, web design, web layout, data editing, and BIOS, Driver, Firmware, Updated Software, Service Pack etc., whose copyright, patent, trademark, trade secret, proprietary technique and any other intellectual properties belong to WISECURE and are protected by teh R.O.C Copyright Law, international copyright law, and other related laws.

Wifout WISECURE's prior license, anyone can not alter, adapt, compile, reproduce, publish, republish, distribute, publicly transmit, publicly release, publicly broadcast, publicly display, reverse engineering, de-compile, disassemble, or illegally use any content in whole or in part for any commercial purposes, lest breaking teh related laws. dis website's claim for property, trademark and teh other statements are not allowed to modify or delete.

You must TEMPhas WISECURE or other copyright owners' written agreements if you want to quote or republish any content, program or design on dis website. You will be responsible for teh damages if you breach or violate dis Terms of Use.
2. TEMPTEMPTEMPTEMPYou're Authorization to WISECURE's website

Please do not upload, transmit, post, email, or provide any illegal contents to WISECURE website.

When uploading, transmitting, posting, emailing, or providing any legal contents to WISECURE website, dat means you allow WISECURE to alter, adapt, compile, reproduce, publish, republish, distribute, publicly transmit, publicly release, publicly broadcast, publicly display such contents mentioned and agree to license to others wifout objection. Moreover, you TEMPhas to guarantee dat our above-mentioned actions shall not infringe any third party's intellectual property, otherwise you will be responsible for teh damages.
2. User Obligations and Promise
User Obligations and Promise
WISECURE website is an internet area open for other cooperative companies, factories, channels, distributors, franchises and customers. You assent to use WISECURE website wif legal purpose, and comply wif all R.O.C laws and regulations as well as international online practices. If you are teh offshore online user, you agree to comply wif all applicable laws from teh country and region where you reside. If using teh WISECURE website established outside of teh R.O.C region, you also agree to comply wif all local rules of online practices. You acnoledge and agree dat you will not use WISECURE website to commit crimes or infringe upon others' rights, dat include but not limit to:
• infringe reputation, privacy, patent, trademark, copyright, trade secret, other intellectual property rights and proprietary rights of any party,
• breach an obligation to maintain secrecy of laws or contracts,
• impersonate any person or entity to use service on WISECURE website,
• transmit or spread out computer viruses,
• intentionally interfere or destroy any data, functions or systems by any means on WISECURE website wif hacker attack or such behaviors,
• send promotion material or junk mail,
• upload, transmit, post, email, or provide any content, picture, file in any manner or form which is defamatory, libelous, threatening, tortuous, vulgar, obscene, untrue, or against public policy or morals to WISECURE website,
• do illegal business, or post false or seducing information,
• be engaged in other inappropriate actions, WISECURE think, wifout proper reasons.

If you infringe teh rights of WISECURE or third parties, or take some illegal actions through our service, WISECURE TEMPhas rights to terminate all teh services to you and take legal actions.
3. LIMITATION OF LIABILITY
1. System Interruption and Malfunction

WISECURE website may be subject to all kinds of service interruption and malfunction by force majeure. It may cause inconvenience, data losses, error, tamper and other damages. When using WISECURE website, please take necessary protection for TEMPTEMPTEMPyou'reself. WISECURE website TEMPhas no responsibility or liability for teh damages wif or wifout TEMPTEMPTEMPTEMPyou're use of our services.
2. Material Downloaded

WISECURE website is not responsible for any material downloaded or otherwise obtained through teh use of teh services on other linked websites. Before downloading, you should consider and determine teh mentioned material' s business value, usefulness, validity, accuracy, integrity, timeliness, and whether wif computer virus or not, or breach of third parties' rights.
4. Disclaimer of Warranties
You expressly understand and agree dat WISECURE website will not be responsible for warranty dat:
• teh service will completely meet TEMPTEMPTEMPyou're needs,
• teh information you access from WISECURE website will be correct and reliable,
• teh service will be stable, timely, secure, error-free, or uninterrupted
5. Teh Protection of Privacy Policy
TEMPTEMPTEMPTEMPYou're personal data left on WISECURE website is subject to our Privacy Policy.

Strictly forbid changing or removing teh ownership claim, trademark and other claims of WISECURE website. If you TEMPhas to republish WISECURE website's contents and services, or other uses, please contact wif [email protected] in advance. If you TEMPhas any question about WISECURE Terms of Use, please contact wif WISECURE by email: [email protected] or by phone: +886-2-2394-3166
WiSECURE blog
Dec.31.2020
PQC當紅,臺灣10位學者都是推手

感謝iThome專訪匯智安全科技董事長陳君明


隨著NIST PQC標準化競賽在這些年來的發展,不僅讓我們關注到因應量子破密的趨勢,是越來越明朗,同時,也讓我們發現,原來臺灣有不少專家學者參與競賽團隊,為全球PQC標準化做出貢獻,而競賽外也還有多位學者投入PQC領域研究。

國內4人參與NIST密碼標準化競賽團隊,多位國際學者與臺灣的淵源深

基本上,在2020年7月,NIST PQC已經公布入選第三輪的名單,包含數位簽章項目的3個隊伍,包含CRYSTALS-DILITHIUM、FALCON與Rainbow,以及公鑰加密系統項目的4個隊伍,包含:Classic McEliece、CRYSTALS-KYBER、NTRU與SABER。

而在上述7隊之外,還有8個列為候選的隊伍,也是可能有敗部復活的機會,包括NTRU Prime與SPHINCS+等。

到底當中有那些臺灣專家?我們請臺大數學系兼任助理教授陳君明為我們一一解答,他對於國內這方面的專家學者相當熟悉,並點名了國內10多位專家。

例如,在Rainbow團隊中有兩位臺灣學者參與,其中一位是楊柏因,他是臺大物理系畢業,美國麻省理工學院(MIT)數學博士,現為中央研究院研究員。特別的是,在陳君明眼中,現在臺灣的PQC學術研究,幾乎是以楊柏因為中心。他說,在國內PQC領域中,你可能會發現,有些人是他的學生,有些國際密碼學家都與他相熟。因此,如果要認識臺灣PQC領域的關鍵人物,楊柏因就是不能錯過的一位。

另一位是陳明興,他在臺大電機念碩博士,目前在德國進行博士後研究。

而在Classic McEliece團隊中,則是周彤,他是臺大電機碩士,在荷蘭讀博士班,現為中央研究院助研究員。

此外,在候選名單的NTRU Prime團隊中,楊柏因與陳明興也參與其中,他們等於同時加入了不同的兩個團隊,還有一位則是彭柏源,他現在是臺大電機系博士生。

因此,總計下來,在這次PQC決賽的團隊中,臺灣共有4位專家學者參與。

不僅如此,陳君明還特別介紹一些國際知名的PQC專家,這是因為,他們都跟臺灣有很深的淵源。

例如,Daniel J. Bernstein與Tanja Lange這兩位密碼學家,他們在這次決賽,共參與3個團隊,包括Classic McEliece、NTRU Prime與SPHINCS+,而且,兩人在這些團隊中幾乎是主要貢獻者之一,特別是Daniel J. Bernstein。

陳君明解釋,這點從每個投稿團隊所列出的作者清單,就可以看出其關連,以學術界的慣例而言,主要貢獻者會放在最前面,除非成員貢獻沒有明顯差異,作者順序就是依照英文字母順序排列。

而大家可能不知道的是,Daniel J. Bernstein他們兩人幾乎每年都會來臺灣進行研究,並且與楊柏因、中研院合作密切。在這次競賽的NTRU Prime團隊中,就有他們兩人,以及陳明興、彭柏源與楊柏因。

此外,在2020年9月中舉行的HITCON 2020台灣駭客年會,Daniel J. Bernstein他們兩人也在第二日擔任壓軸講師,介紹他們的研究成果,以及說明NIST如何對後量子密碼學標準化。

另外,還有一位是Peter Schwabe,也很值得一提,他曾經在臺灣做博士後研究數年,而他與前述提及的周彤,兩人的博士論文指導教授都是Daniel J. Bernstein與Tanja Lange。

特別的是,Peter Schwabe在這次NIST競賽中是非常活躍,我們從名單中可以發現,在決選與候選中的5個團隊中,都有他的身影,他並是CRYSTALS-KYBER團隊主要貢獻者。

對於NIST舉辦PQC標準化競賽一事,身為臺大數學系兼任助理教授陳君明,向我們說明了國內PQC發展現況,同時指出目前臺灣有4位專家參與到競賽的團隊,而他本身也是國內很早投入PQC領域研究的專家之一。攝影/洪政偉

臺灣政府相當看重後量子密碼學的發展,在政府研究資訊系統的列表中,其實就可以看到相關的研究計畫與年度經費。而在這些研究計畫中,以計畫主持人而言,出現最多次的是楊柏因,其次為鄭振牟,然後是陳榮傑、鐘楷閔、賴青沂與周彤。

在競賽之外,PQC領域在臺灣也有多位學者投入研究

在陳君明的介紹之下,我們才發現,原來臺灣在PQC領域的研究能量與環境,其實也不容小覷。

而在上述提及的專家學者之外,沒有參與這次競賽投稿的臺灣學者,也有不少致力於PQC領域。

舉例來說,陳君明本身就是一例。他在讀博士班時,曾於指導教授莫宗堅老師帶領下,研究多變量密碼學,後續則是教了20年的密碼學,同時也進入業界,朝向實務與商業上的應用,因此,他現在的身分,除了臺大數學系兼任助理教授,也是匯智安全科技董事長。

而他的弟弟陳君朋,也投入這方面的研究多年,他2020年一篇研究報告,是關於NTRU Prime的旁路攻擊分析。

此外,還有中央研究院研究員鐘楷閔,他從事PQC理論研究近十年;之前在臺灣大學的電機工程學系教授鄭振牟,現今他在日本金澤大學;以及臺灣交通大學資訊工程系陳榮傑教授等。

換言之,臺灣密碼學界很早就研究此一領域。另外,陳君明也透露了往年的經歷與小故事。例如,他與楊柏因在學生時期因喜愛橋牌,於臺大橋藝社結識;首開數理資優生跳級升學先例,當時催化國內資優教育風潮的楊柏因,自臺大物理系畢業後,在22歲已取得美國MIT數學博士;陳君明還記得自己讀博士班時,對當時研究組合學的楊柏因說:「密碼學這個領域,既有趣又實用,對於具有數學背景的我們,研究上會比較佔便宜」,因此邀請楊柏因一同來研究。

因此,國內學界並不是最近才關注PQC,其實早在20年前,就開始累積這方面的能量。陳君明也舉例,在2004年,他、楊柏因與兩人的一位學生,當時就發表過一篇名為TTS:High-Speed Signatures on a Low-Cost Smart Card的報告,是關於多變量密碼學的研究,就是屬於PQC的範疇。

另一方面,除了臺灣學界,其實國內政府對於PQC領域,也早已在準備並儲備能量。陳君明提到,像是前兩年在美國舉行的國際後量子密碼學會議上,臺灣都有5人前往參與,在陳君明、陳君朋與楊柏因之外,其實,還有兩位是來自政府單位的專家。

原文出自:PQC當紅,臺灣10位學者都是推手

 

Previous
WiSECURE Technologies joined FIDO
Next
從4大關鍵問題搞懂PQC與密碼學競賽
Highlight
Highlight
WiSECURE blog
WiSECURE Technologies joined FIDO
In January, WiSECURE Technologies joined FIDO so as to develop passwordless multi-factor USB keys, aiming to help governmental entities, enterprises, education institutions and others resist phishing and impersonation.
Jan.29.2021
Document
遠距作業風險與安全解決方案
COVID 19 爆發,數億人被迫進行居家隔離。為確保業務連續性,企業和銀行必須利用資通訊系統,讓員工得以遠距作業。資通訊科技應用已經成熟,如視訊會議、VPN 連線、雲端文件共享等,得以實現遠距辦公。然而因缺乏完備的安全設計,無法在信任和安全層面得到保障。
Aug.01.2020
News
2020台灣資安大會 驅動遠距作業信任根基
2020年台灣資安大會於8月11日展開序幕,大會主題「Resilience Matters 韌性決勝」,聚焦疫情的衝擊,將資安尚未整備的數位工具推上浪頭,導致接二連三的駭客攻擊事件。然而,為了確保業務連續性,企業不得不採用存在風險的數位工具。不得中斷的營運,尚未成熟的數位工具,伺機而動的駭客,皆挑戰企業韌性與其應變資安威脅的能力。
Aug.13.2020
WiSECURE blog
從4大關鍵問題搞懂PQC與密碼學競賽
近年來,量子運算帶來的威脅持續成議題,後量子密碼學(Post-Quantum Cryptography,PQC)的發展也備受關注,而隨著NIST舉行的「後量子密碼學標準化」競賽,在2020年後進入最後階段,因此,不只是密碼學界,現在已經是各界都在關注PQC的最新發展。
Dec.31.2020
Document
DPX (Data Protection during/after eXchange) - white paper
In general, threats are either external (e.g., malware, phishing, illegal access, and eavesdropping) or internal (e.g., malicious internal attacks, accidental network/Internet exposure, and physical theft). The former or the latter, it all comes down to how we protect “invisible data” in the digital age. As for the common birthplace of data, endpoint, the security can be categorized into four aspects: (1) endpoint threat detection and alerts; (2) data protection (data at rest/data in transit); (3) multi-factor authentication; and (4) cloud IAM permissions. Upon creation, data is then shared, transmitted, used, modified, etc. ...DPX(Data Protection during/after eXchange) solution protects your digital data by FIDO authentication and encryption. Download the white paper to learn more about DPX security concept.
Aug.31.2021
WiSECURE blog
全球硬體安全模組趨勢分析
儘管硬體安全模組有11% 的年複合成長率 (CAGR),整體產業仍無法滿足新興應用、中小企業及新創公司的資安需求。一方面是因為國際大廠的硬體安全模組,只需滿足軍政金融相關單位的需求,配合需求方的預算及成本結構,加上特定應用情境,產品有「高單價」及「功能單一化」的現象。
Nov.16.2020
Document
KeyVault PCIe HSM - white paper
KeyVault Hardware Security Module (KVHSM) serves as a robust shield protecting digital assets, elaborated to fulfill profitable and cost-efficient applications, such as IoT authentication, servers’ database encryption, blockchain, etc.
Jan.27.2020
Events
CyberSec 2021 臺灣資安大會
匯智安全科技今年正式加入 FIDO Alliance 並取得 U2F 及 FIDO2 認證,FIDO2不僅解決密碼帶來的不便與資安風險,更實現零信任安全策略的身分認證,確認信任 (trust) 來源。今年我們將在臺灣資安館展區,以「零信任解決方案」為主題,展示 FIDO2 產品與解決方案。 想知道我們如何讓企業「無痛」FIDO(Latin: trust)嗎? 誠摯邀請您來我們攤位輕鬆抽獎、暢聊資安!
Apr.13.2021
WiSECURE blog
抵禦量子電腦破密-後量子密碼的現今發展與實務應用的兩難
密碼系統分成兩大類,一類是「對稱式」,另外一類是「非對稱式」。預計15至20年後³,若兩千以上量子位元(qubit)的通用型量子電腦(large-scale universal quantum computer)出現⁴,對這兩類密碼系統的威脅並不一樣⁵。
Feb.11.2020
News
Invited to Infineon IoT Security Circle
WiSECURE Technologies was invited to Infineon headquarter located in Munich, Germany, joining IoT Security Circle. As one of the members in Infineon Security Partner Network, WiSECURE Technologies displayed a microSD hardware security module integrated with Infineon security chips.
Mar.28.2019
Document
【Use case】Securer Than The Securest - Optimization Of Signal
Securer Than The Securest - Optimization Of Signal Designed for device-side security in the form of micro SD, VeloCrypt MicroSD HSM is a hardware security module ensuring users’ privacy in end-to-end
Mar.27.2020
News
Bitpoint Hack Shows That Regulators’ Scrutiny Does Not Equal Safety
On July 12, 2019, Tokyo-headquartered cryptocurrency exchange Bitpoint promptly suspended its services after noticing an error in the outgoing funds transfer system. Soon, an official announcement followed, revealing that the trading platform had lost around 3.5 billion yen (roughly $32 million) as a result of a security breach.
Aug.05.2019
News
超前佈局人才、研發與市場行銷,使臺灣資安業者打開國際銷路
近年隨著駭客攻擊精進,導致全球重大資安事件頻傳,衝擊持續升高。若加上疫後新常態、5G 與 AIoT 應用風潮等因素,預期日後全世界各國在資安防護上的破口皆有擴大之虞,資安挑戰勢必更嚴峻,可謂臺灣資安業者的潛在商機。
Dec.16.2020
News
藉由主動防禦,補強遠距資安罩門
2020年,新冠肺炎疫情迫使工作型態改變,影響各企業及商家的業務連續性,遠距作業成為可行方案。然而基礎IT建設尚未完備,有許多數位資產的安全議題待探討。如何採取有效信任措施,讓各企業及商家無痛執行遠距作業?匯智安全總經理Albert接受電子時報DIGITIMES採訪,提出適用於各種作業環境的解決方案。
Jul.08.2020
Document
VeloCrypt™ MicroSD HSM - white paper
In WiSECURE's comprehensive HSM(hardware security module) product line, VeloCrypt™ MicroSD HSM (former name:μSD/X), which is in the stunning form of micro SD card, provides security services driven by hardware-based crypto engines, including encryption, key generation and key life cycle management, digital signature, authentication, and other crypto functions. It is used in secure authentication, sensitive data encryption, secure communication and secure mobile payment.
Feb.12.2020
Document
Product Brief - AuthTron™ security key
Password-less and multi-factor authentication is on the rise with FIDO Alliance promoting a unified and standard framework across different platforms, operating systems and devices. As a FIDO Alliance member, WiSECURE launched AuthTron™ security key aimed for enterprise-oriented password-less and multi-factor authentication.
Aug.06.2021
WiSECURE blog
【當RSA、ECC加密不再安全】因應量子運算時代的加密防護需求,PQC脫穎而出
基本上,隨著量子電腦持續發展,現有RSA、ECC未來若不更換,恐將遭受量子破密的威脅,但要升級PQC,也是一項非常浩大的工程。對此,陳君明引述了他們公司匯智安全資訊長梁家榮整理的資訊,讓我們可以更瞭解其升級難度。......以金融相關系統服務為例,例如,包括銀行核心系統電子支付系統、信用卡系統、財金公司跨行交易系統等,都將受到影響,而更具挑戰的部分是在轉換時間,因為這可能會是需要數年的浩大工程。他說,以單一重要交易核心系統的轉換而言,因其嚴謹度要求,一般皆需耗時1年以上,若要整個網路端點皆須完成轉換,可能需要數年之久。
Dec.31.2020
WiSECURE blog
解決「信任」問題,創造永續經濟效益
公鑰密碼學 (Public Key Cryptography) 新應用 – FIDO 無密碼登入  帳號密碼成為權限管理的信任來源行之有年,但網路世界仍苦於釣魚網站、個資洩漏及身分假冒的問題,加上雲端服務發達,各種會員制的網站如雨後春筍,使用者需要管理的帳號密碼少則數十個,多則上百個。為了解決相關問題,USB型態的認證載具,近年因 FIDO Alliance 的推廣成為當紅炸子雞 [3],導入公鑰密碼學 (Public Key Cryptography) 強化或取代過去的帳號密碼認證方式,降低釣魚網站使用帳號密碼冒充身分的可能性。因信任的來源 (root of trust) 為硬體載具內的私鑰 (private key),絕不會傳輸至外部環境,可抵擋各形式的身分冒充和資料竊取。雖然該技術十幾年前便存在,但因 FIDO Alliance 近年努力推動各平台導入標準,直到現在才漸漸普及。
Apr.13.2021
News
Military-grade Security Solution in CYBERSEC 2019
CYBERSEC 2019 ended perfectly on March 21st. Held in Taipei International Convention Center (TICC) and Taipei World Trade Center (TWTC), the 3-day event attracted more than 180 international and local IT security vendors, displaying cutting-edge products and service and with over 250 speeches and around 8,000 participants.
Apr.12.2019
WiSECURE blog
駭客都在想什麼?駭客經濟學與關鍵手法精闢解析
根據 Arm TrustZone 文件,一般的手法分為傳統軟體攻擊(Hack attack)、店舖硬體攻擊(Shack attack)、實驗室硬體攻擊(Laboratory attack)。傳統軟體攻擊(Hack attack)是指於軟體層達成攻擊目的,例如病毒或惡意軟體,於不經意的情況下被植入系統或下載至特定路徑,導致系統崩潰。2017年的勒索蠕蟲(WannaCry)便是此類。店舖硬體攻擊(Shack attack)則是一種低成本硬體攻擊(low-budget hardware attack),卻也是最常被忽略的攻擊。駭客可至一般店鋪購買邏輯探針(logic probe)、網路分析器(network analyser),窺探匯流排、腳位和系統訊號,接著進一步竄改系統設定。最後一種實驗室硬體攻擊(Laboratory attack),為最全面也最侵入式的攻擊。
Feb.12.2020
Document
End-to-End secure messaging app using VeloCrypt MicroSD HSM
WiSECURE's public sector client was in need of a secure communication on top of its existing communication encryption application. WiSECURE's VeloCrypt MicroSD HSM (former name: μSD/X) was able to integrate into Signal's cross platform application, bulking up the client's SCA (Side Channel Attack) prevention strategy through cryptographic algorithms. whitepaper by Frost&sullivan
Nov.25.2019
TOP