Asset3 Shutterstock 627837206 1 1540 800 614245ed1385d

Cryptography: Is A Hardware Or Software Implementation More Effective?

Sept. 15, 2021
This Technical Tutorial examines the pros and cons of both hardware and software approaches and walks the user through why dedicated cryptographic hardware provides a better solution for most applications.
This tutorial is part of a series that is designed to provide a quick study guide in cryptography for a product development engineer. Each segment takes an engineering rather than theoretical approach on the topic. In this installment, you'll learn the difference between hardware and software implementations of cryptographic solutions and get insights on some common applications.

Sponsored

Compact buzzers, speakers, and microphones provide options for maximum flexibility

Same Sky Devices' diverse range of buzzers, speakers, and microphones are designed to minimize footprints and maximize reliability to address the trend of miniaturization. All...

MEMS Microphone Interfaces: Analog vs. Digital Outputs

The utilization of MEMS microphones presents an opportunity to incorporate sophisticated communication and monitoring capabilities into a wide range of devices.

MEMS versus ECM: Comparing Microphone Technologies

Two of the most commonly used technologies in microphone construction are micro-electro-mechanical system (MEMS) microphones and electret condenser microphones (ECM), with numerous...

Automatic Fixture Removal Plug-in Demonstration

Automatic Fixture Removal (AFR) is an intuitive software plug-in that is used to accurately measure hard to access devices, such as SMD sized components mounted on a fixture by...