Latest from Embedded

Dreamstime_Josepalbert13_200048283
dreamstime_data__josepalbert13_200048283
ID 107786319 © Pakphipat Charoenrach - Dreamstime.com
id_107786319__pakphipat_charoenrach__dreamstime
ID 318454663 © BiancoBlue - Dreamstime.com
Fighter airplane
ID 86392130 © Belish - Dreamstime.com
promo__id_86392130__belish__dreamstime
ID 124110546 © Maciek905 | Dreamstime.com
code_dreamstime_l_124110546
ID 23655199 © Pere Sanz | Dreamstime.com
oscilloscope_dreamstime_l_23655199
Leandro DRS
image
Dreamstime_Prostockstudio_371930154
dreamstime_ai__prostockstudio_371930154
100269668 © Ronstik | Dreamstime.com
promo_100269668__ronstik__dreamstime
Key Awargula, Dreamstime.com
Key Awargula Dreamstime com Xl 139764659 6090513be7402

Cryptographic Techniques for Safer Firmware (.PDF Download)

May 3, 2021

Read this article online.

Firmware—permanent software programmed into read-only memory that provides the low-level control for a device's hardware—is a fact of life for every embedded electronic device.

Equally a fact of life is the possibility that the device finds itself the target of malicious activity. Principles of cryptography often play an important part in the protection of a device against attackers when considering the design of its firmware. This article will discuss four examples of how embedded processing can be made more secure using cryptographic techniques: performing over-the-air (OTA) updates safely; encrypted communication on a host network; secure key sharing; and authentication.