Hardware

Design Methods for Embedded Security

Download Now Free registration required

Executive Summary

Embedded devices need both an efficient and a secure implementation of cryptographic algorithms. In this overview paper the authors show a typical top-down approach for secure and efficient implementation of embedded systems. The authors outline the security pyramid by illustrating the five primary abstraction levels in an embedded system. Focusing only on two levels - architecture and circuit level - the authors' show how the design can be implemented to be both efficient and secure.

  • Format: PDF
  • Size: 138.9 KB