Secure boot and OTA protected
Implementing PQC algorithms in software might not be enough for high-security embedded systems. Attackers can use DPA (Differential Power Analysis) as a side-channel attack to measure tiny power fluctuations emitted by a chip during cryptographic operations such as secure boot or an over-the-air firmware update. It’s possible to then use the gathered information to expose the secret keys used in ML-DSA or ML-KEM to compromise the entire system’s security.
PQMicroLib-Core
PQMicroLib-Core provides patented, integrated software countermeasures for ML-KEM and ML-DSA, ensuring cryptographic operations are timing constant – in other words, masking the secret data and defeating a DPA attack. The library can be optimized for resource-constrained devices, including SmartFusion’s embedded Cortex-M3, over a low footprint, ensuring PQC operations can run efficiently within the RoT limited power budget.
