<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Product news &amp; updates &#8211; Xiphera</title>
	<atom:link href="https://xiphera.com/category/product-news-updates/feed/" rel="self" type="application/rss+xml" />
	<link>https://xiphera.com</link>
	<description></description>
	<lastBuildDate>Wed, 17 Dec 2025 14:29:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://xiphera.com/wp-content/uploads/2023/05/xiphera-favicon.svg</url>
	<title>Product news &amp; updates &#8211; Xiphera</title>
	<link>https://xiphera.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CAVP-Validated Post-Quantum Cryptography</title>
		<link>https://xiphera.com/cavp-validated-post-quantum-security/</link>
		
		<dc:creator><![CDATA[Reija Stenroos]]></dc:creator>
		<pubDate>Fri, 28 Nov 2025 09:07:44 +0000</pubDate>
				<category><![CDATA[Product news & updates]]></category>
		<guid isPermaLink="false">https://xiphera.com/?p=10186</guid>

					<description><![CDATA[Quantum computers will eventually break today’s public key encryption, and attackers may already capture and store sensitive data to decrypt in the future. Critical information must be protected in advance, before quantum technology becomes widely available.]]></description>
										<content:encoded><![CDATA[
<p>Xiphera’s xQlave® Post-Quantum Cryptography product family provides cryptographic protection designed specifically for the quantum era. Our ML-KEM and ML-DSA implementations are validated under the NIST CAVP program, ensuring they follow NIST standards and operate correctly in real hardware.</p>



<h2 class="wp-block-heading"><strong>Why CAVP matters</strong>?</h2>



<p>• Independent verification and standards compliance<br>• Assurance that cryptography behaves as intended in deployment<br>• Confidence for long-term security planning in critical systems</p>



<p>Xiphera’s xQlave® PQC portfolio is built for ASIC and FPGA environments with the highest security requirements over long product lifecycles.<br><br>ML-KEM provides systems with quantum-resilient&nbsp;key exchange, and ML-DSA delivers Post-Quantum Digital Signatures to authenticate devices and users, ensuring system integrity. Both are implemented as pure RTL logic design with no hidden software, minimizing the attack surface and supporting predictable execution for demanding use cases.</p>



<p>These hardware-based PQC solutions support a wide range of security-critical industries, including defense, energy, telecommunications, industrial automation and space.</p>



<p>Now is the time to adopt hardware-based security that delivers predictable protection for decades and beyond<ins>.</ins></p>



<p><a href="https://xiphera.com/wp-content/uploads/CAVP-1-1.pdf" data-type="attachment" data-id="10192">Read more about CAVP Validated Post-</a><a href="https://xiphera.com/wp-content/uploads/CAVP-ja-ML-KEM-ja-ML-DSA-3.pdf" data-type="attachment" data-id="10197">Quantum</a><a href="https://xiphera.com/wp-content/uploads/CAVP-1-1.pdf" data-type="attachment" data-id="10192"> Security. </a><a id="_msocom_1"></a></p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Xiphera and Crypto Quantique Announce Partnership for Quantum-Resilient Hardware Trust Engines </title>
		<link>https://xiphera.com/xiphera-and-crypto-quantique-announce-partnership-for-quantum-resilient-hardware-trust-engines/</link>
		
		<dc:creator><![CDATA[Mimmi Kuusisaari]]></dc:creator>
		<pubDate>Wed, 30 Oct 2024 08:30:00 +0000</pubDate>
				<category><![CDATA[Company news & updates]]></category>
		<category><![CDATA[Product news & updates]]></category>
		<guid isPermaLink="false">https://xiphera.com/?p=6966</guid>

					<description><![CDATA[Combining Crypto Quantique’s PUF technology with Xiphera’s quantum-resilient cryptography provides future-proof hardware trust engines to protect devices and data for decades to come.]]></description>
										<content:encoded><![CDATA[
<p>ESPOO, Finland, and LONDON, United Kingdom – <a href="https://xiphera.com/">Xiphera</a>, a provider of highly-optimised, hardware-based cryptographic security, today announced its partnership with <a href="https://www.cryptoquantique.com/" target="_blank" rel="noopener">Crypto Quantique</a>, a provider of quantum-driven IoT device security. The combination of Xiphera’s nQrux® Hardware Trust Engines and quantum-secure cryptographic IP, with Crypto Quantique’s QDID PUF (Physically Unclonable Function), offers quantum-resilience and immutable device identity for cryptographic hardware modules.</p>



<p>The QDID PUF<strong>&nbsp;</strong>generates quantum-derived, secure, unclonable identities based on manufacturing variations unique to each semiconductor chip.&nbsp;The PUF, alongside other cryptographic primitives, forms the essential hardware root-of-trust IP required in security implementations.</p>



<p>nQrux® Hardware Trust Engines offer customisable cryptographic security modules with hardware-level trust and security services for the most critical environments and applications. nQrux IP cores enable full isolation of cryptographic operations and application-specific data into secure hardware elements. Xiphera’s extensive portfolio of cryptographic IP cores includes both traditional cryptographic algorithms, as well as Post-Quantum Cryptography (PQC) fighting against the looming quantum threat.</p>



<p>“Many industrial and governmental entities recommend implementing quantum-resilient hardware solutions to prevent quantum attacks on current and future data. Cryptographic root-of-trust forms the security foundation of modern hardware infrastructures”, said&nbsp;<strong>Kimmo Järvinen</strong>, co-founder and CTO of Xiphera. “Upgrading these critical components to quantum-resilient algorithms and integrating Crypto Quantique’s PUF technology enables our customers to protect the identities and core security of their hardware devices into the foreseeable future.”</p>



<p>Crypto Quantique’s CEO,&nbsp;<strong>Shahram Mossayebi</strong>, said, “The combination of nQrux Hardware Trust Engines and QDID provides the adaptability and upgradeability required for the security of connected devices. QDID creates random numbers on demand, so there is no need to store cryptographic keys in flash memory. This eliminates the danger of side-channel memory attacks revealing the keys. In addition, because PQC algorithms have large cryptographic keys, the PUF technology reduces the size of flash memory needed, reducing both power consumption and saving silicon area.”</p>



<p>Learn more about <a href="https://xiphera.com/hardware-trust-engines/">Xiphera’s nQrux® Hardware Trust Engines</a>, and <a href="https://www.cryptoquantique.com/qdid-puf-ip/" target="_blank" rel="noopener">Crypto Quantique’s QDID IP cores.</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Secure Your Computing System’s Power-Up Process with Secure Boot?</title>
		<link>https://xiphera.com/how-to-secure-your-computing-systems-power-up-process-with-secure-boot/</link>
		
		<dc:creator><![CDATA[Mimmi Kuusisaari]]></dc:creator>
		<pubDate>Fri, 04 Oct 2024 07:20:00 +0000</pubDate>
				<category><![CDATA[Product news & updates]]></category>
		<guid isPermaLink="false">https://xiphera.com/?p=6843</guid>

					<description><![CDATA[A hardware-based secure boot can strengthen the integrity of a computing system during its power-up. How can we implement a secure boot in our devices, and what prerequisites are required?]]></description>
										<content:encoded><![CDATA[
<p>Quite often, when one thinks about security and cryptography in particular, the focus is on&nbsp;<strong>confidentiality</strong>: How do I keep my messages secret? How do I keep my computing device secure so that attackers cannot access my valuable data?&nbsp;</p>



<p>However,&nbsp;<strong>integrity</strong>&nbsp;is quite often even a prerequisite for confidentiality in a computer system. Therefore, one should also ask:&nbsp;</p>



<p><em>How do I know that the messages I send are received unmodified?&nbsp;</em></p>



<p><em>How do I know that my computing device behaves as intended and is not running some malicious piece of software that leaks all my secrets to an attacker?</em></p>



<p>In a personal computer, you might run an anti-malware tool that checks programs before execution and flags the program with suspicious traits as malware (such as known features from existing malware), preventing it from being executed. Anti-malware tools are well-established technology and work quite well as soon as they are running – however, the problem is that they are started up relatively late in the system boot cycle. Before anti-malfare tools, a lot of firmware and software are loaded into the system such as boot loaders, boot managers, operating system kernels, drivers, operating systems, and many other applications. Additionally, anti-malware tools do not provide cryptographic guarantees about software legitimacy.</p>



<p>If an attacker is able to inject malicious code in the low-level software components loaded during the system boot, then the game is lost before it even really started – after that point, the attacker may have full control over the computing device, or at least some very critical part of the system.&nbsp;</p>



<h2 class="wp-block-heading">What does a secure boot do?</h2>



<p>Secure boot refers to a piece of technology that ensures integrity of a computing system during its boot-up process, guaranteeing that a system is booted with firmware and/or software that can be trusted to originate from a known source. More specifically, secure boot ensures that a binary image that is loaded into the system is authentic – that is to say, it has been signed by a legitimate party (for example, the OEM). This is performed by verifying a digital signature, which is attached to the actual firmware/software, by using the legitimate party&#8217;s public key.</p>



<p>If secure boot is enabled in a system, then software is allowed to be executed in the system only if it has a digital signature that can be successfully verified. The component that verifies digital signatures and contains the public keys used in those verifications form the root-of-trust for the device. All subsequent trust is derived from this root-of-trust by forming a chain of trust: the root-of-trust verifies a (firmware/software) component, which then itself becomes a trusted component after successful verification and can be used for verifying further components.</p>



<figure class="wp-block-image aligncenter size-large"><img fetchpriority="high" decoding="async" width="1024" height="294" src="https://xiphera.com/wp-content/uploads/secure-boot-blog-img-resize-1024x294.png" alt="Demonstration of a secure boot process in a hardware system." class="wp-image-6861" srcset="https://xiphera.com/wp-content/uploads/secure-boot-blog-img-resize-1024x294.png 1024w, https://xiphera.com/wp-content/uploads/secure-boot-blog-img-resize-300x86.png 300w, https://xiphera.com/wp-content/uploads/secure-boot-blog-img-resize-768x220.png 768w, https://xiphera.com/wp-content/uploads/secure-boot-blog-img-resize-1536x441.png 1536w, https://xiphera.com/wp-content/uploads/secure-boot-blog-img-resize-2048x587.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Demonstration of a secure boot process in a hardware system.</figcaption></figure>



<h2 class="wp-block-heading">What is required from secure boot?</h2>



<p>The component that performs the secure boot must be trustworthy. It must be impossible for an attacker to modify the verification process or the public keys which are used in the verification process. In other words, the component must be tamper-proof.&nbsp;</p>



<p>In order to guarantee the immutability, it is often preferred to use a hardware root-of-trust: a tamper-proof hardware component, that can be used in secure boot for performing the verification and one-time programmable memories for public key storage. It is good to understand that sometimes the hardware root-of-trust may support other operations besides those needed in secure boot – hence, it can be used for other cryptographic services as well even during runtime.</p>



<p>One nice feature of secure boot with digital signatures is that the device where the authentication (secure boot) is performed does not need to include any cryptographic secrets, but only public keys. Because of this lack of secrets, the device is a much harder target for attacks. A successful attack would need to manipulate either the functionality of the digital hardware component or replace the public key with a malicious one, both of which are extremely difficult tasks to succeed due to the immutable nature of hardware. Moreover, even if an attacker is able to hack one device as a result of a difficult and laborious physical attack, they have not recovered any information (such as a secret key) that would automatically compromise similar devices. Importantly, the lack of secrets also means that they are not targets for side-channel attacks.</p>



<h2 class="wp-block-heading">What if also the confidentiality of firmware must be protected?</h2>



<p>Every now and then, there may be good reasons to protect&nbsp;<strong>both integrity (authenticity) and confidentiality</strong>&nbsp;of programs in secure boot; for example, when a firmware/software includes critical intellectual property or hardcoded cryptographic secrets. Good examples are configuration bit files for FPGAs which are typically protected for both confidentiality and authenticity.&nbsp;</p>



<p>In such cases, the aforementioned protection of integrity is not sufficient and actual encryption is required. It is possible to use symmetric encryption combined with message authentication (for example, AES +&nbsp;<a href="https://xiphera.com/hash-functions/key-derivation-functions/">HMAC</a>) or an authenticated encryption scheme (for example,&nbsp;<a href="https://xiphera.com/symmetric-encryption/aes-gcm/">AES-GCM</a>).</p>



<p>However, in symmetric encryption, the decryption requires cryptographic secrets to be included in the secure boot component, consequently making the device a target for various implementation attacks including side-channel attacks. It is also seldom economically feasible to use a unique key for all devices of a product family (and thus a different firmware image for all of them), so cracking the secrets out of one device typically breaks a large number of similar devices. For this reason, it may be a good idea to use the secret symmetric key only for encryption/decryption (confidentiality protection), where it cannot be avoided, and still use digital signatures and public keys for the integrity protection – then, integrity protection is preserved even if the secret key is leaked from a device.</p>



<p>For more information about secure boot, <a href="https://xiphera.com/hardware-trust-engines/secure-boot/" data-type="page" data-id="6551">visit the page for Xiphera&#8217;s quantum-resistant nQrux® Secure Boot.</a></p>



<p class="has-background" style="background-color:#f7f7f7"><a href="https://xiphera.com/webinars/quantum-resilient-secure-boot-building-trust-from-power-up/" data-type="webinars" data-id="6894"><strong>WEBINAR: <em>Quantum-Resilient Secure Boot – Building Trust from Power-up</em></strong><br></a><br>The trust in a computing platform’s operation is established during its power-up. If this boot sequence is not secured, the entire computing platform may be compromised.<br><br>In the webinar <strong>Quantum-Resilient Secure Boot – Building Trust from Power-up</strong>, part of the webinar series <a href="https://xiphera.com/webinars/">Cryptography Under the Hood</a>, we review how hardware-based cryptographic mechanisms can be used to secure the boot process of a computing platform. We will discover how to secure the confidentiality, integrity, and authenticity of the boot process with post-quantum secure boot.<br><br><a href="https://xiphera.com/webinars/quantum-resilient-secure-boot-building-trust-from-power-up/" data-type="webinars" data-id="6894">Watch recording.</a></p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Xiphera Announces Quantum-Resistant Secure Boot</title>
		<link>https://xiphera.com/xiphera-announces-quantum-resistant-secure-boot/</link>
		
		<dc:creator><![CDATA[Mimmi Kuusisaari]]></dc:creator>
		<pubDate>Wed, 28 Aug 2024 06:45:00 +0000</pubDate>
				<category><![CDATA[Product news & updates]]></category>
		<guid isPermaLink="false">https://xiphera.com/?p=6481</guid>

					<description><![CDATA[The new Secure Boot for the nQrux® Hardware Trust Engines family uses a hybrid signature scheme, offering a fundamental building block for creating trust in computing systems.]]></description>
										<content:encoded><![CDATA[
<p>Xiphera introduces nQrux® Secure Boot – a new solution for secure boot in Xiphera’s&nbsp;<a href="https://xiphera.com/hardware-trust-engines/">nQrux® Hardware Trust Engines family</a>. The solution provides quantum-secure authentication for boot images and firmware updates.</p>



<p>Secure boot provides assurance of functional integrity, a critical step for establishing trust in any computing system in operation. Xiphera’s nQrux® Secure Boot verifies digital signatures attached to the binary image loaded into a computing system, preventing malicious actors from injecting their own code into the system and ensuring trust in the system.</p>



<p>nQrux® Secure Boot uses a hybrid signature scheme consisting of <a href="https://xiphera.com/asymmetric-cryptography/ecdh-ecdsa-nist-curves/" data-type="page" data-id="1219">ECDSA</a>, a traditional digital signature scheme based on elliptic curves, and new <a href="https://xiphera.com/post-quantum-cryptography/digital-signatures/">quantum-secure signature scheme ML-DSA</a>, both standardised by the American National Institute of Standards and Technology (NIST). The hybrid solution ensures system security even if quantum computers break ECDSA in the future, or if a weakness is identified in the new ML-DSA standard. nQrux® Secure Boot is based on pure digital logic and does not include any hidden software components, providing first-class security and easier validation and certification.</p>



<p>“Secure boot is a fundamental requirement in creating trust in computing systems,” says&nbsp;<strong>Kimmo Järvinen</strong>, co-founder and CTO of Xiphera. “nQrux® Secure Boot is a valuable addition to our product family for hardware trust engines. It combines standardised cutting-edge Post-Quantum Cryptography with Xiphera’s pure hardware-based digital design”.</p>



<p>nQrux® Secure Boot is delivered as a device and process node agnostic IP core, easily integrated across FPGA and ASIC architectures. The IP core will be available for customer evaluations in Q4/2024.</p>



<p>For more information on the technical features,&nbsp;<a href="https://xiphera.com/contact/">send us a message</a>.&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Systems Designed Today Must Support Post-Quantum Cryptography Tomorrow</title>
		<link>https://xiphera.com/systems-designed-today-must-support-post-quantum-cryptography-tomorrow/</link>
		
		<dc:creator><![CDATA[Mimmi Kuusisaari]]></dc:creator>
		<pubDate>Tue, 23 Jul 2024 06:25:29 +0000</pubDate>
				<category><![CDATA[Product news & updates]]></category>
		<category><![CDATA[Company news & updates]]></category>
		<guid isPermaLink="false">https://xiphera.com/?p=6332</guid>

					<description><![CDATA[Post-Quantum Cryptography (PQC) will answer to the imminent threat created by advances in quantum computing. Xiphera will present and demonstrate hardware-based IP cores for PQC algorithms in Japan in September 2024.]]></description>
										<content:encoded><![CDATA[
<p>The landscape of cryptography and cybersecurity is inevitably shifting: the rapid development of quantum computers will solve many computational problems, but at the same time, it creates novel threats to securing data and information. Powerful enough quantum computers will eventually be able to break the traditional public-key cryptographic algorithms such as RSA and elliptic curve cryptography that we use in our everyday lives.</p>



<p>Post-quantum cryptography (PQC) answers to the imminent quantum threat. PQC algorithms are implemented on traditional computational platforms, but they withstand both traditional and quantum attacks. Implementing PQC already today is crucial for everyone, but its importance is emphasised especially in long lifecycle applications e.g. in industrial and automotive industries.</p>



<p>Xiphera’s&nbsp;<a href="https://xiphera.com/post-quantum-cryptography/">xQlave® family of Post-Quantum Cryptography</a>&nbsp;consists of fully hardware-based PQC IP cores, designed to withstand quantum attacks and implemented without any software components. The xQlave® family includes IP cores for&nbsp;<a href="https://xiphera.com/post-quantum-cryptography/key-encapsulation-mechanism/">ML-KEM (previously CRYSTALS-Kyber) Key Encapsulation Mechanism</a>&nbsp;and&nbsp;<a href="https://xiphera.com/post-quantum-cryptography/digital-signatures/">ML-DSA (previously CRYSTALS-Dilithium) Digital Signature</a>&nbsp;algorithms.&nbsp;&nbsp;The IP cores comply with&nbsp;<a href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank" rel="noreferrer noopener">the standardisation of PQC algorithms by the American National Institute of Standards and Technology (NIST).</a></p>



<p>To learn more about Post-Quantum Cryptography, <a href="https://xiphera.com/post-quantum-cryptography/">visit Xiphera’s xQlave® PQC family page</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Xiphera’s Customisable nQrux™ Confidential Computing Engine Protects Cloud, Edge, and AI Environments</title>
		<link>https://xiphera.com/xipheras-customisable-nqrux-confidential-computing-engine-protects-cloud-edge-and-ai-environments/</link>
		
		<dc:creator><![CDATA[Mimmi Kuusisaari]]></dc:creator>
		<pubDate>Thu, 30 May 2024 05:52:39 +0000</pubDate>
				<category><![CDATA[Product news & updates]]></category>
		<guid isPermaLink="false">https://xiphera.com/?p=5962</guid>

					<description><![CDATA[nQrux™ CCE solution is customised to include various types of computing resources, while the communication of data and code is protected with hardware-based implementation of TLS 1.3.]]></description>
										<content:encoded><![CDATA[
<p>Xiphera introduces&nbsp;<a href="https://xiphera.com/hardware-trust-engines/confidential-computing-engine" data-type="link" data-id="https://xiphera.com/hardware-trust-engines/confidential-computing-engine">Confidential Computing Engine (CCE)</a>&nbsp;for the&nbsp;<a href="https://xiphera.com/hardware-trust-engines/">nQrux™ family of Hardware Trust Engines</a>. The nQrux™ CCE offers customisable solutions for secure code execution environments protecting data, code, and Artificial Intelligence (AI) models in cloud, edge, and AI environments.</p>



<p>The nQrux™ CCE solution is customised to include various types of computing resources including CPU cores and specific accelerators, for example, for AI. Data and code are remotely uploaded over a protected communication channel to be processed securely in the CCE. Additionally, the CCE solution includes a feature where client nodes can be categorised into groups with different access rights to the resources of the CCE – for instance, one client can provide AI models for an embedded AI accelerator inside the CCE, the other clients (such as sensors) can upload data to be processed in the AI computation, while a third client may have the right to access the result of the AI computation.</p>



<p>Communication of data and code to the nQrux™ CCE is protected with hardware-based implementation of&nbsp;<a href="http://xiphera.com/security-protocols/tls">TLS 1.3</a>. Access policies are enforced with hardware isolation of resources and with client-authentication of TLS 1.3, so that only clients with appropriate certificates are allowed to access (write and/or read) specific resources.</p>



<figure class="wp-block-image aligncenter size-full is-resized"><img decoding="async" width="1000" height="400" src="https://xiphera.com/wp-content/uploads/XIP7700_block-diagram.png" alt="" class="wp-image-5963" style="width:637px;height:auto" srcset="https://xiphera.com/wp-content/uploads/XIP7700_block-diagram.png 1000w, https://xiphera.com/wp-content/uploads/XIP7700_block-diagram-300x120.png 300w, https://xiphera.com/wp-content/uploads/XIP7700_block-diagram-768x307.png 768w" sizes="(max-width: 1000px) 100vw, 1000px" /><figcaption class="wp-element-caption"><em>Example high-level block diagram of the nQrux™ Confidential Computing Engine.</em></figcaption></figure>



<p>“The new CCE core provides uniquely tailored solutions, to protect for example AI or other code in remote environments such as Edge, cloud, and satellites”, says&nbsp;<strong>Petri Jehkonen</strong>, Xiphera’s Director of Strategic Programs. “The computing elements, such as RISC-V or AI accelerators, are physically and cryptographically isolated from the rest of the system, mitigating CPU or cache vulnerabilities, while offering flexibility to use general purpose programming languages with security related processing tasks.”</p>



<p>For more information, visit the product page of&nbsp;<a href="https://xiphera.com/hardware-trust-engines/confidential-computing-engine" data-type="link" data-id="https://xiphera.com/hardware-trust-engines/confidential-computing-engine">Confidential Computing Engine (CCE)</a>&nbsp;and the family page of&nbsp;<a href="https://xiphera.com/hardware-trust-engines/">nQrux™ Hardware Trust Engines</a>. With any additional questions and inquires,&nbsp;<a href="http://xiphera.com/contact">contact us directly</a>.</p>



<p class="has-background" style="background-color:#f1f1f1"><strong>WEBINAR – <em>Fortifying Digital Resilience: Security Foundations for IoT, AI, and Cloud Systems</em><br></strong><br>Ensuring digital resilience requires certain security elements from the underlying foundations of hardware infrastructures, software platforms, and digital identities. The specific needs and requirements for these elements vary across different industries and customer environments, making the customisability of cryptographic solutions essential.<br><br>This webinar reviews the challenges and practical building blocks for strengthening digital resilience within modern IoT, Cloud, and AI environments.<br><br><a href="https://xiphera.com/webinars/fortifying-digital-resilience-security-foundations-for-iot-ai-and-cloud-systems/" data-type="webinars" data-id="6029">Watch the recording.</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cryptographic Modules Provide Critical Security in a Unified and Isolated Hardware Solution</title>
		<link>https://xiphera.com/cryptographic-modules-provide-critical-security-in-a-unified-and-isolated-hardware-solution/</link>
		
		<dc:creator><![CDATA[Mimmi Kuusisaari]]></dc:creator>
		<pubDate>Tue, 07 May 2024 08:48:06 +0000</pubDate>
				<category><![CDATA[Product news & updates]]></category>
		<guid isPermaLink="false">https://xiphera.com/?p=5642</guid>

					<description><![CDATA[Cryptographic modules offer an all-inclusive cryptography package for customised security needs. This blog deep-dives into the benefits, implementations, and possible use cases of a hardware-based cryptographic module.]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Why do we need cryptographic modules?</h2>



<p>Securing data and communications, within and between microcontrollers, System on Chip implementations, and other systems, requires a range of cryptographic operations. These services include&nbsp;<a href="https://xiphera.com/hash-functions/">hash functions</a>&nbsp;for ensuring data integrity,&nbsp;<a href="https://xiphera.com/symmetric-encryption/">symmetric encryption</a>&nbsp;for encrypting bulk data in transit or at rest,&nbsp;<a href="https://xiphera.com/asymmetric-cryptography/">asymmetric encryption</a>&nbsp;for key exchange, signing data and messages, as well as authenticating components, users, and accounts, and finally a source of&nbsp;<a href="https://xiphera.com/random-number-generation/">quality randomness</a>&nbsp;for cryptographic key generation.</p>



<p>Implementing all of these securely and in an optimised manner for a hardware platform requires in-depth skills and understanding of both cryptography and digital design for microcircuits. The various cryptographic services can be implemented, and are typically offered, as distinct IP cores dedicated to a single specified cryptographic algorithm. Additional logic and integration will need to be implemented around these IP cores to facilitate the necessary cryptographic operations and processes required by the surrounding total solution. Complexity of the system increases attack surface and the risk of design flaws and security vulnerabilities. </p>



<p>For these reasons, critical security services are often segregated into a single <strong>cryptographic module</strong>, behind a unified and well-defined interface for access by the rest of the system. This introduces a cryptographic boundary, which isolates security critical operations from the rest of the system. </p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" width="1024" height="298" src="https://xiphera.com/wp-content/uploads/cryptographic-module-diagram-1024x298.png" alt="A cryptographic module combines multiple cryptographic primitives into a single security solution, isolating security critical operation from the rest of the system." class="wp-image-5643" style="width:734px;height:auto" srcset="https://xiphera.com/wp-content/uploads/cryptographic-module-diagram-1024x298.png 1024w, https://xiphera.com/wp-content/uploads/cryptographic-module-diagram-300x87.png 300w, https://xiphera.com/wp-content/uploads/cryptographic-module-diagram-768x224.png 768w, https://xiphera.com/wp-content/uploads/cryptographic-module-diagram.png 1043w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>A cryptographic module combines multiple cryptographic primitives into a single security solution, isolating security critical operation from the rest of the system.</em></figcaption></figure>



<h2 class="wp-block-heading">Implementing cryptographic modules securely (today and tomorrow)</h2>



<p>In designing a cryptographic module, it is critical to ensure that the module architecture is efficient, to limit access behind a unified, well-defined, and secure interface, and to minimise total attack surface. Module composition (selection of the provided security services, algorithms, and key lengths), as well as the optimisation of the implementation (area vs. performance), can be done according to system and industry requirements (e.g. for IoT, industrial, data centre, hyperscaler, telecommunications, space, or automotive use).&nbsp;</p>



<p>The most secure and efficient way to implement a cryptographic module for hardware is to ensure it is directly designed in hardware as digital logic. This method removes dependency on a multi-layered software technology stack with increased attack surface and potential for design flaws and vulnerabilities. Avoiding embedded CPU and its software components has benefits for performance and power consumption – and most critically, for security. Streamlining the architecture, defining a clear cryptographic boundary, and removing software and CPU components from the design also enable more straightforward and cost-effective validation and certification processes.</p>



<p>Hardware solution security needs to be ensured throughout the whole solution life-cycle, from implementation until the decommissioning. This life-cycle can in some cases last for several decades. The rapid development of quantum computers has raised future threat for the eventual shattering of the security of the infrastructures that our daily digital lives, businesses, and democratic societies rely on. That is why hardware solutions designed and implemented today already need to, at the very minimum, have the capability to be upgraded to <a href="https://xiphera.com/post-quantum-cryptography/">Post-Quantum Cryptography (PQC)</a>, or to already complement traditional asymmetric algorithms with PQC into a hybrid cryptographic system. Cryptographic modules should be designed to offer quantum-safe key exchange and digital signature operations, that ensure the security of our critical and personal information well into the foreseeable future. <a href="https://xiphera.com/the-future-of-public-key-cryptography-will-be-post-quantum-cryptography/">Read more about the quantum threat and Post-Quantum Cryptography.</a></p>



<h2 class="wp-block-heading">Where are cryptographic modules used?</h2>



<p>A hardware-based cryptographic module has multiple use cases, as it can be easily integrated to various systems for the purpose of offloading and accelerating cryptographic operations, and to act as a cryptographic coprocessor for System on Chips or to power secure communication between a microcontroller and other components.&nbsp;</p>



<p>Cryptographic modules can be used, for example, in a modern automotive system to authenticate and secure communications between various components, such as LIDAR and the Electronic Control Unit. They can also be implemented as the security core in an Authenticated or Secure Boot solution, to ensure the authenticity, integrity, and optionally confidentiality of the system boot image loaded during boot process. Adding secure key generation, storage, and management enables the implementation of a Hardware Root of Trust or a Hardware Security Module – the foundation of trust and security – in a hardware system. </p>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-dots"/>



<p>Cryptographic modules are the beating heart of a hardware security system, and it is crucial to ensure they are implemented in the most secure and clean design possible. They offer a cost-effective and proven way to implement system security, enabling a design team to focus on the value-add functionality of the end product, without getting bogged down in the intricacies of cryptographic algorithms.&nbsp;</p>



<p class="has-background" style="background-color:#f5f5f5"><a href="https://xiphera.com/hardware-trust-engines/crypto-module/">Learn more about cryptographic modules and Xiphera’s nQrux™ Crypto Module</a>. The nQrux™ Crypto Module is tailored to meet specific customer security, performance, and area requirements for an optimal solution to implementing cryptographic operations in a hardware device. </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Xiphera Launches nQrux™ Family of Hardware Trust Engines for Hardware-Isolated Cryptographic Services and Computing Environments</title>
		<link>https://xiphera.com/xiphera-launches-nqrux-family-of-hardware-trust-engines-for-hardware-isolated-cryptographic-services-and-computing-environments/</link>
		
		<dc:creator><![CDATA[Mimmi Kuusisaari]]></dc:creator>
		<pubDate>Tue, 09 Apr 2024 04:30:00 +0000</pubDate>
				<category><![CDATA[Product news & updates]]></category>
		<guid isPermaLink="false">https://xiphera.com/?p=5348</guid>

					<description><![CDATA[The new nQrux™ portfolio offers highly optimised and customisable security solutions with cryptographic operations implemented purely in hardware.]]></description>
										<content:encoded><![CDATA[
<p>Espoo, Finland – Xiphera announces the <a href="https://xiphera.com/hardware-trust-engines">nQrux™ family of Hardware Trust Engines</a>. The new family introduces highly optimised and customisable security solutions, offering exceptional security modules performing purely hardware-based cryptographic operations.</p>



<p>nQrux™ Hardware Trust Engines introduce novel security architectures, delivering hardware-level trust for the most critical environments and applications. The solutions in the nQrux™ portfolio ensure the complete isolation of cryptographic operations and application-specific data within inherently secure hardware elements. This enables the freedom from embedded CPUs or software elements, enabling paramount security and performance levels.</p>



<p>&#8220;We are thrilled to launch nQrux™, a family that collects Xiphera&#8217;s solutions for building larger system-level security&#8221;,&nbsp;<strong>Kimmo Järvinen</strong>, Xiphera’s co-founder and CTO, comments.</p>



<p>The nQrux™ family consists of cryptographic security solutions built on Xiphera’s cryptographic IP cores that are fully standard compliant (IEEE, IETF, NIST), and CAVP validated by NIST. The solutions in the nQrux™ portfolio have optimised configurations based on customer footprint, performance, and security requirements. Xiphera’s <a href="https://xiphera.com/crypto-module/" data-type="page" data-id="4599">Crypto Module</a> provides an integrated security platform with customer-tailored set of highly optimised cryptographic services for microcontrollers and SoC implementations. The versatile configurations of Xiphera Crypto Module enable fully optimised feature set to fit customer requirements for functionality, performance, and resources.</p>



<p>With the launch of the nQrux™ family, Xiphera announces Confidential Computing Engines (CCE) as part of the nQrux™ family of Hardware Trust Engines. The CCE offer a secure code execution environment protecting data, code, and AI models in cloud, edge, and AI environments. &#8220;CCE is our first opening in the domain of trusted computing where hardware-based cryptography and isolation are used for building trust in remote computation&#8221;, Kimmo Järvinen concludes. Xiphera’s CCE will be ready for customer evaluation in 2024.</p>



<p><a href="https://xiphera.com/hardware-trust-engines" data-type="link" data-id="https://xiphera.com/hardware-trust-engines">Read more about the nQrux™ family of Hardware Trust Engines.</a></p>



<h2 class="wp-block-heading"><strong>About Xiphera&nbsp;</strong></h2>



<p>Xiphera, Ltd, designs and implements proven cryptographic security for embedded systems. Our strong cryptographic expertise and extensive experience in digital system design enable us to help our customers to protect their most valuable assets.</p>



<p>We offer secure and highly optimised cryptographic Intellectual Property (IP) cores, designed directly for Field Programmable Gate Arrays (FPGAs) and Application Specific Integrated Circuits (ASICs) without software components. Our broad, fully in-house designed, and up-to-date portfolio, including implementations of Post-Quantum Cryptography, enables cost-effective development projects with fast time-to-market – providing peace of mind in a dangerous world.</p>



<h3 class="wp-block-heading"><strong>Media contacts</strong></h3>



<p>Mimmi Kuusisaari<br>Marketing and Communications Coordinator<br><a href="mailto:marketing@xiphera.com">marketing(at)xiphera.com</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Scalable Extreme-speed IPsec Added to Xiphera’s Security Protocols Portfolio</title>
		<link>https://xiphera.com/scalable-extreme-speed-ipsec-added-to-xipheras-security-protocols-portfolio/</link>
		
		<dc:creator><![CDATA[Mimmi Kuusisaari]]></dc:creator>
		<pubDate>Tue, 05 Mar 2024 11:12:29 +0000</pubDate>
				<category><![CDATA[Product news & updates]]></category>
		<guid isPermaLink="false">https://xiphera.com/?p=5105</guid>

					<description><![CDATA[The IPsec IP core complements Xiphera’s Security Protocols offering, bringing proven security for the critical layers 2-4 of the OSI model.]]></description>
										<content:encoded><![CDATA[
<p>Xiphera releases&nbsp;<a href="http://xiphera.com/security-protocols/ipsec">extreme-speed IPsec (Internet Protocol security)</a>&nbsp;IP (Intellectual Property) core. The new IP core completes&nbsp;<a href="http://xiphera.com/security-protocols">the Security Protocols family</a>&nbsp;providing protection for the layers 2, 3, and 4 of&nbsp;<a href="https://xiphera.com/what-is-the-osi-model-and-how-can-we-protect-its-critical-layers/">the OSI model.</a>&nbsp;IPsec, on layer 3 (also known as the Network layer), secures the network traffic on the Internet Protocol layer, authenticating and encrypting Internet Protocol packets within a communication session.</p>



<p>IPsec protocol is widely used in various operating systems and network devices. It is most commonly used to secure communications in Virtual Private Networks (VPNs) over the Internet. Today’s hybrid and remote work environments are an excellent example of the importance of secure communications – IPsec secures network-to-network communications e.g. between sites, data centers, and businesses.</p>



<figure class="wp-block-image aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1000" height="714" src="https://xiphera.com/wp-content/uploads/XIP7013E_block-diagram.png" alt="Internal high-level block diagram of Xiphera's extreme-speed IPsec IP core (XIP7013E)." class="wp-image-5082" style="width:416px;height:auto" srcset="https://xiphera.com/wp-content/uploads/XIP7013E_block-diagram.png 1000w, https://xiphera.com/wp-content/uploads/XIP7013E_block-diagram-300x214.png 300w, https://xiphera.com/wp-content/uploads/XIP7013E_block-diagram-768x548.png 768w" sizes="(max-width: 1000px) 100vw, 1000px" /><figcaption class="wp-element-caption">Internal high-level block diagram of Xiphera&#8217;s extreme-speed IPsec (XIP7013E).</figcaption></figure>



<p>Xiphera’s extreme-speed IPsec IP core implements the ESP (Encapsulating Security Payload) frame processing of the IPsec protocol, using Xiphera’s own&nbsp;<a href="http://xiphera.com/symmetric-encryption/aes-gcm">AES256-GCM IP core</a>&nbsp;as its crypto engine to protect data confidentiality and integrity as well as data origin authentication. The IPsec core achieves a throughput exceeding 200 Gigabits per second (Gbps) in modern high-end FPGAs and ASICs, making it an excellent solution to secure traffic on links from 10 to 200 Gbps.</p>



<p>“Our IPsec offers scalable solution to meet the needed performance requirements by achieving full throughput with wanted linerate despite packet sizes. Latency of the IP is fixed, which is vital for timing critical applications”, says&nbsp;<strong>Tuomo Tarvainen</strong>, Xiphera’s System Architect.</p>



<p>For more information, visit&nbsp;<a href="http://xiphera.com/security-protocols/ipsec">the IPsec product page</a>, or open&nbsp;the <a href="https://xiphera.com/wp-content/uploads/XIP7013E_PB.pdf" target="_blank" data-type="link" data-id="https://xiphera.com/wp-content/uploads/XIP7013E_PB.pdf" rel="noreferrer noopener">full product brief.</a></p>



<p class="has-background" style="background-color:#f1f1f1"><em>To learn more about how to secure your device communications with Xiphera&#8217;s Security Protocols – MACsec, IPsec, and TLS 1.3 – watch our webinar </em><a href="https://xiphera.com/webinars/securing-device-communications/" data-type="webinars" data-id="5142"><strong><em>Cryptography at Work: Securing Device Communications</em></strong></a><em>.</em></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Is the OSI Model, and How Can We Protect Its Critical Layers?</title>
		<link>https://xiphera.com/what-is-the-osi-model-and-how-can-we-protect-its-critical-layers/</link>
		
		<dc:creator><![CDATA[Mimmi Kuusisaari]]></dc:creator>
		<pubDate>Thu, 29 Feb 2024 09:48:09 +0000</pubDate>
				<category><![CDATA[Product news & updates]]></category>
		<guid isPermaLink="false">https://xiphera.com/?p=5087</guid>

					<description><![CDATA[The OSI model is the basis for most of the modern digital communications. Let’s dive into the seven layers of the OSI model and answers the billion-dollar question: how to protect the transmitted data throughout the OSI model?]]></description>
										<content:encoded><![CDATA[
<p>We spend hours and hours online. We send emails, play online games, sit in remote business meetings, browse the Internet&#8230; For these to happen, we are relying on seamless data flow every minute, every day. That’s why institutions worldwide have created standards for fluent communications – one of the most famous ones is the OSI model, which in order to be fully reliable needs proven security on its critical layers.</p>



<h2 class="wp-block-heading">OSI model – what and why?</h2>



<p>Open System Interconnection (OSI) model introduces the seven layers for device communications. It was developed in the 1980s for a standardised process of communications between different manufacturer’s computers (for example, between Windows and MacBook computers). Today, the OSI model can be implemented on two-way data flow between any devices. In the seven layers of the OSI model, the transmitted data goes from layer 7 to layer 1, gets transmitted via physical network (for example, through LAN, WLAN, Bluetooth, 5G, optical cable, etc.), and then at the receiving end, flows from layer 1 to 7 and finally to the receiving device/user.&nbsp;</p>



<p>In the real world, the data does not always follow precisely the seven layers of the OSI model. Today, many network communications use&nbsp;<a href="https://xiphera.com/example-of-tcp-ip-operation-over-ethernet/">TCP/IP protocol</a>&nbsp;(Transmission Control Protocol / Internet Protocol), where the protocol’s fewer layers compared to the OSI model are not as formally defined.</p>



<h2 class="wp-block-heading">Seven layers of OSI model</h2>



<p>OSI model introduces the following layers for the transmitted data flow:&nbsp;</p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:66.66%">
<ol class="wp-block-list">
<li><strong></strong><strong>Physical layer,</strong>&nbsp;covering physical hardware elements such as cables, connectors, or network interface cards.</li>



<li><strong></strong><strong>Data Link layer,</strong>&nbsp;offering point-to-point communication between devices over network and managing access to the Physical layer; the most common example is Ethernet.</li>



<li><strong></strong><strong>Network layer,</strong>&nbsp;determining the best path for data to be transmitted between devices across multiple networks, typically using IP addresses.</li>



<li><strong></strong><strong>Transport layer,</strong>&nbsp;ensuring data integrity through end-to-end communication by segmenting data into smaller units.</li>



<li><strong></strong><strong>Session layer,</strong>&nbsp;creating and managing connections, or sessions, between applications.</li>



<li><strong></strong><strong>Presentation layer,&nbsp;</strong>ensuring data flow between the Session and Application layers to make the data usable for the topmost layer.</li>



<li><strong></strong><strong>Application layer,&nbsp;</strong>utilised by the end user, serving as the interface between network and user software (such as email, remote login, file transfer, web browser, etc.).</li>
</ol>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:33.33%">
<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="700" height="1024" src="https://xiphera.com/wp-content/uploads/OSI-model-700x1024.png" alt="Illustration of the OSI model" class="wp-image-5088" style="width:286px;height:auto" srcset="https://xiphera.com/wp-content/uploads/OSI-model-700x1024.png 700w, https://xiphera.com/wp-content/uploads/OSI-model-205x300.png 205w, https://xiphera.com/wp-content/uploads/OSI-model-768x1124.png 768w, https://xiphera.com/wp-content/uploads/OSI-model-1049x1536.png 1049w, https://xiphera.com/wp-content/uploads/OSI-model.png 1324w" sizes="(max-width: 700px) 100vw, 700px" /></figure>
</div>
</div>



<p>It is important to notice that the commonly implemented TCP/IP model introduces typically only 4 to 5 layers. These layers, however, follow a very similar pattern to the layers presented in the OSI model – the Transport, Internet, and Link or Network layers of the TCP/IP are in principle equivalent to the OSI model’s Transport (4), Network (3), and Data Link + Physical (1-2) layers, respectively, and the Application layer of the TCP/IP model covers the layers 5-7 (Session, Presentation, Application) layers of the OSI model.</p>



<h2 class="wp-block-heading">How to secure data in the OSI model?</h2>



<p>How can we be sure that the data transmitted to the receiving end has not been tampered with during its long and multi-phased journey from OSI layers 7 to 1 and back to 7? This is obviously a critical question in our contemporary world of cyber threats. During the first phase of both OSI and TCP/IP work data security and privacy were not taken into consideration, and the required security protocols were developed afterwards.</p>



<p>Naturally, like every communication, the data in the OSI model needs to be secured throughout its journey. Some layers are more prone to external threats than others. For example, the Application layer (7) of the OSI model is handled directly with end-user applications and services, making it a usual target for various cyber threats.</p>



<p>Layers 2 to 4 (Data Link, Network, Transport), being close to the network interface, are also critical to secure.&nbsp;<strong>The Data Link layer (layer 2)</strong>&nbsp;plays a pivotal role in defining secure communication between directly connected network devices. By securing the Data Link layer, we can affect the overall security of the network, by ensuring data integrity, preventing unauthorised access, and enhancing network performance. Data Link layer can be secured for example with&nbsp;<a href="https://xiphera.com/security-protocols/macsec/"><strong>MACsec</strong></a><strong>&nbsp;(Media Access Control security)</strong>, a point-to-point Ethernet security protocol, protecting both confidentiality and integrity of transmitted data.</p>



<p><strong>The Network layer (3)</strong>, being responsible for forwarding data between networks, is essential to secure for ensuring proper routing and IP address management, preventing unauthorised access or network attacks. A well-established security solution for the Network layer is&nbsp;<a href="https://xiphera.com/security-protocols/ipsec/" data-type="page" data-id="5081"><strong>IPsec</strong></a><strong>&nbsp;(Internet Protocol security)</strong>, securing IP (Internet Protocol) traffic by authenticating and encrypting IP packets within a communication session. IPsec is a widely used security protocol, and its importance in today’s hybrid work environment has increased with growing demand to secure the communications from e.g. our home offices.</p>



<p><strong>The Transport layer (4)</strong>&nbsp;covers end-to-end communication, and maintaining the layer’s confidentiality, integrity, and authenticity is critical for ensuring secure communication. Securing the Transport layer guarantees that the transmitted data has not been corrupted or modified by unauthorised or unwanted parties.&nbsp;<strong>TLS (Transport Layer Security)</strong>protocol provides protection against these threats. The most recent version,&nbsp;<a href="https://xiphera.com/security-protocols/tls/"><strong>TLS 1.3</strong></a>, establishes a secure connection between a client and a server over the Internet, thus securing both endpoints of the session.</p>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<figure class="wp-block-image aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="584" src="https://xiphera.com/wp-content/uploads/security-protocols-for-osi-model-1024x584.png" alt="Security protocols MACsec, IPsec, and TLS 1.3 protect the critical layers 2-4 of the OSI model." class="wp-image-5091" style="width:439px;height:auto" srcset="https://xiphera.com/wp-content/uploads/security-protocols-for-osi-model-1024x584.png 1024w, https://xiphera.com/wp-content/uploads/security-protocols-for-osi-model-300x171.png 300w, https://xiphera.com/wp-content/uploads/security-protocols-for-osi-model-768x438.png 768w, https://xiphera.com/wp-content/uploads/security-protocols-for-osi-model.png 1452w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Like the OSI model, these security protocols are constantly reviewed and standardised. Various international bodies<a href="https://www.nist.gov/" target="_blank" rel="noopener"></a><a href="https://www.bsi.bund.de/DE/Home/home_node.html" target="_blank" rel="noopener"></a>, first and foremost <a href="https://www.ieee.org" target="_blank" data-type="link" data-id="https://www.ieee.org" rel="noreferrer noopener">IEEE</a> (Institute of Electrical and Electronics Engineers) and the Internet community with their <a href="https://www.ietf.org/standards/rfcs/" target="_blank" rel="noreferrer noopener">RFCs (Request for Comments)</a> ensure that the security protocols used for protecting communications in the OSI model are up-to-date.</p>



<h2 class="wp-block-heading">Securing OSI model with hardware-based security</h2>



<p>To conclude, securing data flow in the OSI model is critical. The decision of which layers to secure depends on the context and specific security goals of the network. Nevertheless, it is important to always secure at least one layer of the OSI model.</p>



<p>Typically, enabling security for the layers 2, 3, and/or 4 of the OSI model ensures a high-security level of the communications. These layers, being close to the network interface, can be effectively secured with hardware-based security solution, such as MACsec, IPsec, and TLS 1.3 security protocols introduced above.</p>



<p>Hardware-based security, using cryptographic IP (Intellectual Property) cores, has&nbsp;<a href="https://xiphera.com/why-is-hardware-more-secure-than-software-when-implementing-critical-cryptosystems/">several advantages compared to the software-based security approach</a>. These include for example, higher security level, better performance and higher throughput for the applications, and lower power consumption than what would be achieved with a software-based security implementation.&nbsp;</p>



<p>Xiphera offers hardware-based security with cryptographic IP cores. Our&nbsp;<a href="https://xiphera.com/products/">extensive security portfolio</a>&nbsp;covers security designs based on modern and standardised implementations of cryptographic algorithms directly into FPGAs and ASICs. Our&nbsp;<a href="https://xiphera.com/security-protocols/">Security Protocols family</a>&nbsp;includes security solutions –&nbsp;<a href="https://xiphera.com/security-protocols/macsec/">MACsec</a>,&nbsp;<a href="https://xiphera.com/security-protocols/ipsec/" data-type="page" data-id="5081">IPsec</a>, and&nbsp;<a href="https://xiphera.com/security-protocols/tls/">TLS 1.3</a>&nbsp;– for the most critical layers of the OSI model. These security protocols are typically implemented in conjunction with the commonly used TCP/IP protocol.</p>



<p class="has-background" style="background-color:#f1f1f1"><em>To learn more about how to secure your device communications with MACsec, IPsec, and TLS 1.3 – the three musketeers of Security Protocols protecting OSI model layers 2-4 – watch our webinar </em><a href="https://xiphera.com/webinars/securing-device-communications/" data-type="webinars" data-id="5142"><strong><em>Cryptography at Work: Securing Device Communications</em></strong></a><em>.</em></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
