4CRYPTOGRAPHIC IMPLEMENTATIONS
In Chapter 2, I gave an overview of cryptographic algorithms, their parameters, and typical use cases. However, a mathematical algorithm is still a long way from the secure and efficient implementations of cryptography.
In the majority of applications, cryptography doesn’t play a leading role. It’s more like a necessary evil to protect device and business assets. Therefore, developers and product managers would love to have cryptographic implementations that run in no time, occupy no memory, and consume no energy. Of course, that’s not possible, but it’s a significant discussion point in many cases. Inefficient implementations ...
Get Engineering Secure Devices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.