We’re excited to announce a major evolution in embedded security testing: Crypto 3, the latest framework powering Inspector Software’s advanced security analysis capabilities. Now available in Inspector Software 2025.8, this release transforms how organizations approach side channel analysis and fault injection testing, delivering greater flexibility and automation for security professionals of all expertise levels.
From Unified to Modular: The Crypto 3 Advantage
Building on two decades of embedded security testing excellence, Inspector Software has served the industry with over 100 specialized modules for side channel analysis (SCA) and fault injection (FI) attacks. While our proven Crypto 2 framework provides a unified implementation, customizing it for specific needs requires significant time investment and specialized expertise.
The new Crypto 3 framework revolutionizes your workflow with faster setup, smarter automation, and greater control.
Key Benefits:
- Accelerated Development: Perform the same security analysis with far less code, focusing only on the attack components you need.
- Faster Time-to-Security: Streamlined workflows enable quicker testing, faster vulnerability detection, and shorter time-to-market for secure products.
- Enhanced Flexibility: Modular architecture lets you use only the necessary blocks, easily integrate custom cipher implementations, and accommodate teams with varying expertise levels.
- Future-Ready Security: Post-Quantum Cryptography support and an extensible platform design enable rapid adaptation to emerging cryptographic standards and attack vectors.
- Backward Compatibility: Crypto 2 remains available for legacy workflows, ensuring continuity while Crypto 3 leads the way forward.
Crypto 3 in Action
Designed by our device security engineering team, Crypto 3 introduces a modular and streamlined approach to cryptographic operations, making it easier to implement, extend, and adapt analysis techniques across a wide range of use cases. Rather than requiring a full understanding of the entire system, Crypto 3 divides functionality into focused, independent blocks. This allows developers and users to implement only the components or intermediate values needed for a specific attack, saving time and minimizing the need for in-depth knowledge of the cipher or Inspector’s internal architecture.
For example, if an attack requires just one intermediate value from a cipher, Crypto 3 lets you generate it directly, without navigating complex dependencies. At the same time, Crypto 3 remains fully backward compatible: users can continue working with the complete cipher implementations already available in Inspector or integrate their own, while benefiting from the flexibility and efficiency of the new framework.
Ready for Rapid Post-Quantum Innovation
The rise of Post-Quantum Cryptography (PQC) brings new challenges to security testing, as the landscape continues to evolve and cipher implementations rapidly change. Investing significant time in implementing a single cipher can be inefficient when rapid experimentation is essential.
Crypto 3 addresses this by enabling faster prototyping and testing of new attacks and cipher designs. Its modular structure lets users define only the components required for a specific use case, simplifying exploration and iteration without the burden of deep integration.
Many modern ciphers, particularly those in the PQC domain, also feature key spaces that are too large for traditional exhaustive techniques. Crypto 3 handles these scenarios efficiently by allowing users to focus on the most promising key candidates, streamlining analysis and saving valuable time.
With Crypto 3, you can:
- Experiment faster with new PQC ciphers and attack strategies.
- Customize efficiently by implementing only what’s needed for your use case.
- Analyze smarter by targeting the key candidates that matter most.
Inspector Software
Inspector Software continues to be the complete solution for embedded security validation, supporting acquisition, analysis, and fault injection across embedded systems, chips, and smartcards.
Side Channel Analysis (SC4): Analyze power consumption, electromagnetic emissions, and other leakages to uncover vulnerabilities using advanced signal processing and cryptanalysis tools.
Fault Injection Testing (FJ2): Simulate real-world fault attacks—including clock glitching, voltage manipulation, and laser-based techniques—to test device resilience and extract hidden weaknesses.
Inspector supports your security operations across the full product lifecycle—from validating cryptographic robustness during design phase and FPGA prototyping, to testing prototypes, and securing deployed systems. With Crypto 3, we’ve expanded functionality to integrate more intuitively with our Python API, giving development teams greater flexibility to automate workflows, prototype attacks, and interact with Inspector Software in a more streamlined, scriptable way.
Innovation starts now
Both Crypto 2 and Crypto 3 frameworks remain available, ensuring zero disruption to existing workflows while providing a clear migration path to enhanced capabilities. This initial release of Crypto 3 marks the start of a new framework evolution, with additional modules and features to be introduced in upcoming releases.
Our commitment to backward compatibility means you can begin exploring Crypto 3’s advanced capabilities today while we continue expanding its functionality across the complete Inspector testing suite.
Start testing smarter today. Learn more about Inspector Software Side Channel Analysis and Inspector Software Fault Injection, or contact our team to see Crypto 3 in action.