Security

Cryptanalysis of Hummingbird-1

Free registration required

Executive Summary

The advent of small-form wireless control and communication devices, sensors and authentication tags is affecting commercial, military and domestic security engineering in ways which were almost unimaginable only 10 - 20 years ago. An important selection criterion when choosing cryptographic security components for such extremely constrained devices is obviously cost, which directly relates to the complexity of hardware and software implementation of the component and its computational efficiency. These lightweight cryptographic solutions must also meet stringent security requirements as they are often critical links in the overall "Chain of security" user authentication with a RFID token, a private conversation using a wireless hands-free set and encryption of key presses on a wireless keyboard are some examples.

  • Format: PDF
  • Size: 114.3 KB