From Silicon To Software

Archive for the 'Cryptography' Category

 

Making Crypto History: The Women of Bletchley Park

Remember the movie The Imitation Game? The film depicts Alan Turing and his team at Bletchley Park trying to crack the Enigma machine and decrypt German intelligence codes for the British government during World War II. While modern cryptography relies on complex algorithms and asymmetric key encryption to keep data secure, prior to the 1970s cryptanalysis was mostly a manual process used for military purposes.

Continue Reading...

Posted in Cryptography |

 

Harnessing the Power of Women in Tech: a USA Today Feature

Women play vital roles in developing the tools that engineers around the world use to design smart chips and develop secure code for the amazing devices that are changing the way we work and play. USA Today recently featured three Synopsys engineers, who reflect on their experiences as women in tech and offer advice on carving out success in a male-dominated field.

Continue Reading...

Posted in Application Security, Artificial Intelligence, Automotive, Cryptography, EDA, Healthcare, Internet of Things, IP, Machine Learning, Malware, Optical Design, Privacy, Quantum Computing, Robotics, Security, Superconducting Electronics, TCAD |

 

NIST Validates Synopsys Cryptography IP Software Library

Chip designers can use Synopsys technology to accelerate Cryptographic Module Validation Program (CMVP) and Federal Information Processing Standard (FIPS) 140-2 certification for applications requiring high levels of security. FIPS 140-2 validation is only required if a hardware security module is to be sold to the U.S. government and if it uses cryptography in a security system that handles sensitive but unclassified information. However, it can also be a powerful security product differentiator in the commercial market.

Continue Reading...

Posted in Cryptography, IP |