I joined the Xiphera team in September 2024. Since then, I have been working on side-channel-related tasks, leveraging my academic background in hands-on FPGA programming and chip measurements – skills that have proven invaluable in our testing laboratory.
Side-channel attacks (SCA) exploit physical information leaks from cryptographic devices rather than targeting the mathematical foundation of cryptographic algorithms. These attacks leverage measurable emissions such as power consumption, electromagnetic radiation, or timing variations that occur during cryptographic operations. By analysing this leaked information, attackers can extract sensitive data like encryption keys or decipher the sequence of operations performed by the device. This poses a significant threat even to cryptographic algorithms that are mathematically robust and secure against traditional software-based attacks.
In modern cryptographic implementations, addressing side-channel vulnerabilities is crucial to ensure the overall security of hardware-based encryption. Protecting against SCA involves employing countermeasures that either reduce or eliminate the leakage or mask it to render the leaked information useless to an attacker. Techniques such as noise addition, power balancing, and algorithmic masking are widely used to mitigate these risks. As cryptographic systems are increasingly embedded in hardware for applications like IoT devices, payment systems, and secure communications, designing encryption solutions with effective side-channel protection has become a critical aspect of hardware security.
From theory to practice
I studied at Aalto University in Espoo, Finland, where I discovered my passion for combining hands-on work with coding. Early in my studies, I had the opportunity to contribute to Aalto University’s flagship microprocessor project, A-Core, which deepened my interest in microprocessor design. Toward the end of my master’s studies, I focused on power management and the analysis of micro- and nanoelectronics.
During this time, I faced the decision of whether to continue in academia or transition into industry. At the Aalto Microelectronics Fair, I met Petri Jehkonen, Xiphera’s Director of Strategic Programs, and we discussed how power management and analysis intersect with cryptography. This conversation piqued my interest, and we stayed in touch, ultimately shaping the next step in my career journey.
Working in a side-channel laboratory has been a highly engaging and rewarding experience. I have felt like an integral part of the team, entrusted with my own responsibilities, which has been both empowering and motivating. I’ve particularly enjoyed the opportunity to apply my prior knowledge while continually building upon it throughout my work.
Working in a small firm has been especially fulfilling, as it provides the chance to take on diverse tasks across the design and testing process. Unlike in larger companies, where roles can often be narrowly focused, a smaller environment challenges you to wear many hats, fostering a broader skill set and deeper involvement in various aspects of the projects.
I look forward to deepening my expertise in side-channel protection designs and exploring techniques to enhance hardware security. This journey promises to be both intellectually stimulating and impactful as I work towards developing more secure and resilient systems.
Learn more about Xiphera’s cryptographic IP cores and security solutions.