CHAPTER 8 Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems
In this chapter we will finally look at cryptographic algorithms and how to make them work for embedded machines. Cryptography presents the biggest challenge to any security solution to be implemented for an embedded device because of the requirements of these computationally complex algorithms. Cryptography is notoriously expensive when it comes to clock cycles, and many algorithms are not too friendly to smaller memory devices. We will look at various strategies for choosing algorithms for specific applications, and look at some specific algorithms as well as some strategies to avoid some of the more expensive cryptographic operations without compromising ...
Get Practical Embedded Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.