Affiliation:
1. University of Patras, Greece & Technological Educational Institute of Patras, Greece
2. Technological Educational Institute of Patras, Greece & Hellenic Open University, Greece
3. Technological Educational Institute of Patras, Greece
Abstract
Strong security is a necessity in the modern IT world and is broadly provided though Hardware Security Modules (HSM) capable of realizing a wide variety of security algorithms and protocols. Such modules are no longer only found in expensive computer systems like servers, corporate PC, or laptops but also in every device where security is required, including embedded systems like smart cards or smart grid, smart environment, automobile, game station, and aviation processors. The chapter provides to the reader the necessary information on how strong security is structured in a hardware embedded system environment from cryptographic engineering point of view. The focus is efficient design on symmetric, asymmetric cryptography and hash function systems, and design approaches that can be used in order to provide strong security to the embedded system user.
Reference30 articles.
1. Anashin, V., Bogdanov, A., Kizhvatov, I., & Kumar, S. (2005). eSTREAM: A new fast flexible stream cipher.
2. Cryptographic Processors-A Survey
3. Anoop, M. (2008). Security needs in embedded systems. Retrieved from http://eprint.iacr.org/2008/198
4. Barreto, P., Kim, H., & Lynn, B. (2002). Efficient algorithms for pairing-based cryptosystems. In Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '02). Springer-Verlag.
5. Hardware architectures for public key cryptography.;L.Batina;Integration (Tokyo, Japan),2003