• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

IEEE P1735 Encryption Broken

November 7, 2017 by Richard Mu 1 Comment

Security researchers have found weakness “in the Institute of Electrical and Electronics Engineers (IEEE) P1735 cryptography standard that can be exploited to unlock, modify or steal encrypted system-on-chip blueprints.” IEEE P1735 was designed to encrypt electronic-design intellectual property (IP) in the hardware and software. Most mobile and embedded devices include a System-on-Chip (SoC), a circuit that consists of multiple IPS that range from radio-frequency receiver to cryptographic engine from different vendors.

Published by the Department of Homeland Security’s US-CERT, IEEE P1735 is flawed. It was discovered that there was seven vulnerabilities that were found.

Vendors have already been alerted and contacted.

https://thehackernews.com/2017/11/ieee-p1735-ip-encryption.html

Filed Under: Week 10: Web Application Hacking Tagged With:

Reader Interactions

Comments

  1. Younes Khantouri says

    November 8, 2017 at 6:23 pm

    Richard,
    I think this kind of leak is very normal, the Institute of Electrical and Electronics Engineers (IEEE) has to update the software on the encrypted system-on-ship with a new version that can be stronger. I am not too sure how much recent this technology, but it will be a big issue if it has been in the IT world for a long time. I like your article and I think it shows how much so many organizations don’t keep patching their products to prevent attackers from reaching their goals.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in