Explore quantum computing’s impact on cryptography and learn how to prepare SoC designs for post-quantum computing and evolving cryptographic standards.
Remember the movie The Imitation Game? The film depicts Alan Turing and his team at Bletchley Park trying to crack the Enigma machine and decrypt German intelligence codes for the British government during World War II. While modern cryptography relies on complex algorithms and asymmetric key encryption to keep data secure, prior to the 1970s cryptanalysis was mostly a manual process used for military purposes.
Posted in Cryptography
Women play vital roles in developing the tools that engineers around the world use to design smart chips and develop secure code for the amazing devices that are changing the way we work and play. USA Today recently featured three Synopsys engineers, who reflect on their experiences as women in tech and offer advice on carving out success in a male-dominated field.
Posted in Application Security, Artificial Intelligence, Automotive, Cryptography, EDA, Healthcare, Internet of Things, IP, Machine Learning, Malware, Optical Design, Privacy, Quantum Computing, Robotics, Security, Superconducting Electronics, TCAD
Chip designers can use Synopsys technology to accelerate Cryptographic Module Validation Program (CMVP) and Federal Information Processing Standard (FIPS) 140-2 certification for applications requiring high levels of security. FIPS 140-2 validation is only required if a hardware security module is to be sold to the U.S. government and if it uses cryptography in a security system that handles sensitive but unclassified information. However, it can also be a powerful security product differentiator in the commercial market.