Paper 2008/198
Security needs in embedded systems
Anoop MS
Abstract
The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and digital certificates that are used to achieve data protection during data transfer. The paper also discusses the security requirements in the device to prevent possible physical attacks to expose the secure data such as secret keys from the device. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Hardware and software security requirements
- Contact author(s)
- anoopms @ tataelxsi co in
- History
- 2008-05-12: received
- Short URL
- https://ia.cr/2008/198
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2008/198, author = {Anoop MS}, title = {Security needs in embedded systems}, howpublished = {Cryptology {ePrint} Archive, Paper 2008/198}, year = {2008}, url = {https://eprint.iacr.org/2008/198} }