Latest from Embedded

William Wong, 2025 © Endeavor Business Media
Do you recognize these charts
ID 22585047 © Agsandrew | Dreamstime.com
id_22585047__agsandrew__dreamstime_new
ID 361819724 © Anastasiia Torianyk | Dreamstime.com
chip_dreamstime_l_361819724
ID 107552055 © Scanrail | Dreamstime.com
car_headlight_dreamstime_l_107552055
Dreamstime_Audrius_Merfeldas_111096969
dreamstime_audrius_merfeldas_111096969
Sigasi
11myths_promo1920x1080
ID 39055802 © Dwnld777 | Dreamstime.com
bigdata_dreamstime_l_39055802
Chapter5 636ac938323a5

Cryptographic Implementations: Hardware vs. Software (Download)

Nov. 8, 2022
Download the PDF of the fifth chapter of the “The Cryptography Handbook.” It shines a light on the differences of implementing cryptographic solutions via hardware and software, and the essential steps in securely booting a connected device.

Check out the other chapters in the Communication Series:  The Cryptography Handbook

Modern cryptographic algorithms can be implemented using dedicated cryptographic hardware or software running on general-purpose hardware. For various reasons, dedicated cryptographic hardware provides a better solution for most applications.

Secure Boot and Secure Download—What Are They and Why Are They Important?

Among the everyday IoT devices that use embedded hardware are:

  • Home devices: Wi-Fi cameras, IoT thermostats, and smoke detectors
  • Medical devices
  • Wearables, fitness trackers, or smart watches
  • Industrial machines such as robotic arms in factories

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!