International Flavors & Fragrances Inc
Change company Symbol lookup
Select an option...
IFF International Flavors & Fragrances Inc
NEMD iNeedMD Holdings Inc
CVS CVS Health Corp
CMI Cummins Inc
INVH Invitation Homes Inc
OII Oceaneering International Inc
SINO Sino-Global Shipping America Ltd
MLM Martin Marietta Materials Inc
KO Coca-Cola Co
VICI VICI Properties Inc

Materials : Chemicals | Mid Cap Blend
Company profile

International Flavors & Fragrances Inc. provides products that consumers taste, smell, or touch. It operates through three segments: Taste, Frutarom and Scent. Taste is comprised of Flavor Compounds which are sold to the food and beverage industries for use in consumer products, such as prepared foods, beverages, dairy, food and sweet products. Frutarom segment creates and manufactures a naturals-focused suite of flavor compounds, functional foods and specialty fine ingredients. Scent segment is comprised of Fragrance Compounds, which are used by its customers in two broad categories: Fine Fragrances and Consumer Fragrances; Fragrance Ingredients, which consists of synthetic and natural ingredients that can be combined with other materials to create fragrance and consumer compounds; and Cosmetic Active Ingredients, consisting of active and functional ingredients, botanicals and delivery systems.

Closing Price
Day's Change
-0.26 (-0.25%)
B/A Size
Day's High
Day's Low

10-day average volume:

Maxim Integrated Simplifies Security for IoT Designs

8:45 am ET August 7, 2020 (PR Newswire) Print

While the IoT continues to bring greater conveniences into our lives, left unprotected, smart devices could also open the door to malicious attacks that burrow into networks and attempt to access sensitive data. With its newest cryptographic coprocessor featuring ChipDNA(TM) physically unclonable function (PUF) technology, Maxim Integrated Products, Inc. (NASDAQ: MXIM) is simplifying the process of protecting these designs from security threats.

Safeguarding designs that could trigger more harmful breaches is particularly critical. For example, when a smart medical device, such as a pacemaker, is hacked, this could lead to dire or even deadly consequences. Designers of these medical applications would be wise to be able to guarantee that the sensors inside their designs are genuine and to protect them from aftermarket clones; to verify that the data collected by the sensors is genuine; and to enforce usage control and expirations in the case of single- or limited-use disposable peripherals.

Another area where security is important is the industrial IoT, where an attack on automated factory equipment, for example, could disrupt the manufacturing line and lead to lost revenue. Here, it's imperative to ensure that OEM modules are genuine and to establish point-to-point security. Feature control is another consideration. In the production world, it's economical to manufacture, say, one board that supports multiple versions and levels of features. Enabling secure end user feature upgrades protects the integrity of those upgrades.

In summary, securing IoT designs involves meeting these challenges:

-- Safety and reliability: Prevent counterfeit components that could pose safety risks to customers.

-- Key management: A weak security scheme can expose keys for protecting and encrypting sensitive data.

-- Secure boot: Invalid firmware can create opportunities for malware attacks.

-- Endpoint security: Secure communication and authenticity of end points must be addressed.

-- Feature control: Find a way to securely enable and disable various factory-based options.

Cryptographic Coprocessor Makes It Easier to Protect the IoTHardware-based security provides the most robust protection for IoT designs. Compared to its more easily infiltrated software-based counterpart, hardware security provides layers of advanced physical security, cryptographic algorithms, secure boot, encryption, secure key storage, and digital signature generation and verification to fend off malicious attacks. Maxim Integrated's newest DeepCover(R) secure coprocessor with hardware-based cryptography, the DS28S60, provides robust countermeasures that make it easier to protect against security attacks. The device includes:

-- A high-speed 20MHz SPI interface for fast throughput of security operations.

-- A fixed-function ECC/SHA-256/AES cryptographic toolbox.

-- ChipDNA PUF technology.

-- A simple way to implement end-to-end encryption via its built-in key exchange capability, in which the part uses an asymmetric key algorithm to exchange a symmetric key. The symmetric key can then be used to encrypt/decrypt data between two IoT nodes or a sensor node and the cloud.

ChipDNA PUF technology provides strong protection against invasive and reverse-engineering attacks. The PUF circuit relies on the naturally occurring random analog characteristics of fundamental MOSFET devices to produce cryptographic keys. The key is generated only when needed and is then deleted rather than stored on the chip. Any attempt to probe or observe the ChipDNA operation actually modifies the underlying circuit characteristics, which prevents discovery of the secret key.

Here's how the DS28S60 addresses the key design challenges discussed earlier:

-- Safety and reliability: Counterfeit components are blocked from operating in the system.

-- Secure storage: ChipDNA PUF technology is used to encrypt keys, secrets, and all device-stored data.

-- Secure boot: Its SHA-256 and ECDSA crypto toolbox features support secure boot of a host processor.

-- Endpoint security: The device addresses concerns over secure communication and authenticity of end points.

-- Feature control: Securely enable and disable various factory-based options.

An evaluation kit, the DS28S60EVKIT, is available for assessment of the cryptographic coprocessor.

View original content to download multimedia:

SOURCE Maxim Integrated Products, Inc.

comtex tracking

Earnings Calendar and Events Data provided by |Terms of Use| © 2020 Wall Street Horizon, Inc.

Market data accompanied by is delayed by at least 15 minutes for NASDAQ, NYSE MKT, NYSE, and options. Duration of the delay for other exchanges varies.
Market data and information provided by Morningstar.

Options are not suitable for all investors as the special risks inherent to options trading may expose investors to potentially rapid and substantial losses.
Please read Characteristics and Risks of Standard Options before investing in options.

Information and news provided by ,, , Computrade Systems, Inc., , and

Copyright © 2020. All rights reserved.