Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
sasebo_g_ii_32:sasebo_g_ii_32 [2015/10/21 18:00] – created Marthasasebo_g_ii_32:sasebo_g_ii_32 [2020/09/15 22:30] (current) Martha
Line 1: Line 1:
 ====== SASEBO-G-Ⅱ-32 Side-channel Attack Standard Evaluation Board By Inrevium™  ====== ====== SASEBO-G-Ⅱ-32 Side-channel Attack Standard Evaluation Board By Inrevium™  ======
 +
 +{{:sasebo_g_ii_32:sasebo-obl-600.jpg?nolink&400 |}}
 +
 +<WRAP round info 650px>
 +===Note===
 +The SASEBO-G-Ⅱ-32 Side-channel Attack Standard Evaluation Board is retired and no longer for sale in our store. 
 +</WRAP>
  
   * Designed for the purpose of side-channel cryptographic attack experiments   * Designed for the purpose of side-channel cryptographic attack experiments
Line 11: Line 18:
   * USB interface for power supply & configuration   * USB interface for power supply & configuration
   * External power source supplies the on-board power regulators and the FPGAs with 5V. The power regulators convert the 5V input into 3.3V, 1.8V, 1.2V, and 1V for the FPGAs. The 1V core voltage of the cryptographic FPGA can also be applied directly through the external power connector.   * External power source supplies the on-board power regulators and the FPGAs with 5V. The power regulators convert the 5V input into 3.3V, 1.8V, 1.2V, and 1V for the FPGAs. The 1V core voltage of the cryptographic FPGA can also be applied directly through the external power connector.
 +
 +\\
 +\\
  
 With the rapid expansion of broadband networks and the spread of information appliances, IC cards, and radio frequency identification (RFID) tags, etc., large amounts of data are transferred in every phase of daily life. At the same time, security threats such as leakages and falsification of information are on the rise. Cryptography is widely used even in consumer products as a fundamental countermeasure against such threats. However, it is difficult for users to determine whether or not a cryptographic algorithm is implemented properly; it is not unusual for security flaws to be discovered in products advertised as perfectly secure.  With the rapid expansion of broadband networks and the spread of information appliances, IC cards, and radio frequency identification (RFID) tags, etc., large amounts of data are transferred in every phase of daily life. At the same time, security threats such as leakages and falsification of information are on the rise. Cryptography is widely used even in consumer products as a fundamental countermeasure against such threats. However, it is difficult for users to determine whether or not a cryptographic algorithm is implemented properly; it is not unusual for security flaws to be discovered in products advertised as perfectly secure.