IMPLEMENTATION OF SYMMETRIC CRYPTOGRAPHY IN EMBEDDED MEASUREMENT SYSTEMS
نویسندگان
چکیده
منابع مشابه
Cryptography in Embedded Systems: An Overview
It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Note that a large share o...
متن کاملSecurity Challenges and Cryptography in Embedded Systems
Embedded systems now days are integral part of our lives. They are used for various industrial automation purposes, service oriented applications like power, water distribution, healthcare and low cost systems like smart cards and PDA’s. Today, already more than 98% of all manufactured microprocessors are employed in embedded applications rather than in traditional personal computers. Embedded ...
متن کاملCellular Programming and Symmetric Key Cryptography Systems
The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process of encryption highly depends on a quality of used random numbers. One dimensional, nonuniform CAs is considered as a generator of pseudorandom number sequences (PNSs). The quality of PNSs highly depends on a set of applied CA r...
متن کاملElliptic curve cryptography on embedded multicore systems
The increasing use of network-connected embedded devices and online transactions creates a growing demand of network security for embedded systems. The security requirements, such as authentication, confidentiality and integrity, always make computationally intensive processes and can easily become the bottleneck of the related applications. In this paper we implement Elliptic Curve Cryptograph...
متن کاملCryptography and cryptanalysis for embedded systems
A growing number of devices of daily use are equipped with computing capabilities. Today, already more than 98% of all manufactured microprocessors are employed in embedded applications, leaving less than 2% to traditional computers. Many of these embedded devices are enabled to communicate amongst each other and form networks. A side effect of the rising interconnectedness is a possible vulner...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing
سال: 2015
ISSN: 2312-5381,1727-6209
DOI: 10.47839/ijc.14.2.803