Design Methods for Embedded Security
Source: Katholieke Universiteit Leuven
Embedded devices need both an efficient and a secure implementation of cryptographic algorithms. In this overview paper the authors show a typical top-down approach for secure and efficient implementation of embedded systems. The authors outline the security pyramid by illustrating the five primary abstraction levels in an embedded system. Focusing only on two levels - architecture and circuit level - the authors' show how the design can be implemented to be both efficient and secure.