When we implement the firmware and add security features, such as firmware image verification and firmware attestation, we need to use cryptography to protect our system. Classic cryptography can be traced back to the Roman empire when people used the Caesar cipher. It ended at World War II when the Germans used the Enigma machine to encrypt the message, and the Enigma was cracked finally by Bombe – an electro-mechanical device used by the British cryptologists. The two types of classic ciphers are substitution and transposition. However, ...
19. Cryptography
Get Building Secure Firmware: Armoring the Foundation of the Platform now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.