DPA-protected ML-KEM and ML-DSA for Microchip Smart Fusion 2 based RoT

Side-channel protection for the next generation of attack

Secure boot and OTA protected

Implementing PQC algorithms in software might not be enough for high-security embedded systems. Attackers can use DPA (Differential Power Analysis) as a side-channel attack to measure tiny power fluctuations emitted by a chip during cryptographic operations such as secure boot or an over-the-air firmware update. It’s possible to then use the gathered information to expose the secret keys used in ML-DSA or ML-KEM to compromise the entire system’s security.

PQMicroLib-Core

PQMicroLib-Core provides patented, integrated software countermeasures for ML-KEM and ML-DSA, ensuring cryptographic operations are timing constant – in other words, masking the secret data and defeating a DPA attack. The library can be optimized for resource-constrained devices, including SmartFusion’s embedded Cortex-M3, over a low footprint, ensuring PQC operations can run efficiently within the RoT limited power budget.