Asset3 Shutterstock 627837206 1 1540 800 614245ed1385d

Cryptography: Is A Hardware Or Software Implementation More Effective?

Sept. 15, 2021
This Technical Tutorial examines the pros and cons of both hardware and software approaches and walks the user through why dedicated cryptographic hardware provides a better solution for most applications.
This tutorial is part of a series that is designed to provide a quick study guide in cryptography for a product development engineer. Each segment takes an engineering rather than theoretical approach on the topic. In this installment, you'll learn the difference between hardware and software implementations of cryptographic solutions and get insights on some common applications.

Sponsored

The high-voltage CCE4511 interface IC has overvoltage detection, as well as high temperature and overcurrent protection, based on 0.18m HV-CMOS technology. Typical applications...
Transformers are widely used to efficiently transfer both power and data in switching power supplies, MOSFET gate drivers, and isolation circuits.
Advanced asset tracking applications, such as livestock monitoring, fleet management, and logistics, automatically capture current status information and position coordinates ...
Integrated power supply ICs to implement compact and efficient buck converters for factory automation, 5G and IoT.