Hardware

Resource-Conscious Optimization of Cryptographic Algorithms on an Embedded Architecture

Free registration required

Executive Summary

Cryptographic algorithms are widely used in embedded systems. Applications of cryptographic algorithms include credentials establishment (e.g., authentication), securing contents (e.g., encryption/decryption of communication data or rights-managed objects), IP protection, and tamper-resistance checking. Resource constrained embedded systems can benefit greatly from employing cryptographic algorithms that are tuned to consume as little system resources as possible, while at the same time providing reasonable performance. In this paper, the authors study some of the most commonly used cryptographic algorithms. They analyze their performance on an embedded system targeting the Blackfin DSP.

  • Format: PDF
  • Size: 570.1 KB