Paper 2008/198

Security needs in embedded systems

Anoop MS

Abstract

The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and digital certificates that are used to achieve data protection during data transfer. The paper also discusses the security requirements in the device to prevent possible physical attacks to expose the secure data such as secret keys from the device. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
Hardware and software security requirements
Contact author(s)
anoopms @ tataelxsi co in
History
2008-05-12: received
Short URL
https://ia.cr/2008/198
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/198,
      author = {Anoop MS},
      title = {Security needs in embedded systems},
      howpublished = {Cryptology ePrint Archive, Paper 2008/198},
      year = {2008},
      note = {\url{https://eprint.iacr.org/2008/198}},
      url = {https://eprint.iacr.org/2008/198}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.