Cryptology ePrint Archive: Report 2008/198

Security needs in embedded systems

Anoop MS

Abstract: The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and digital certificates that are used to achieve data protection during data transfer. The paper also discusses the security requirements in the device to prevent possible physical attacks to expose the secure data such as secret keys from the device. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device.

Category / Keywords: implementation / Hardware and software security requirements

Date: received 7 May 2008

Contact author: anoopms at tataelxsi co in

Available format(s): PDF | BibTeX Citation

Version: 20080512:195945 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]