International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Security needs in embedded systems

Authors:
Anoop MS
Download:
URL: http://eprint.iacr.org/2008/198
Search ePrint
Search Google
Abstract: The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and digital certificates that are used to achieve data protection during data transfer. The paper also discusses the security requirements in the device to prevent possible physical attacks to expose the secure data such as secret keys from the device. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device.
BibTeX
@misc{eprint-2008-17875,
  title={Security needs in embedded systems},
  booktitle={IACR Eprint archive},
  keywords={implementation / Hardware and software security requirements},
  url={http://eprint.iacr.org/2008/198},
  note={ anoopms@tataelxsi.co.in 14006 received 7 May 2008},
  author={Anoop MS},
  year=2008
}