Exploiting cryptographic architectures over hardware vs. software implementations: advantages and trade-offs

  • Authors:
  • N. Sklavos;K. Touliou;C. Efstathiou

  • Affiliations:
  • Electrical and Computer Engineering Dept., University of Patras, Greece;Department COMELEC, Ecole National Supérieure des Télécommunications, Paris Cedex 13, France;Computer Dept., Technological Educational Institute, Athens, Greece

  • Venue:
  • AEE'06 Proceedings of the 5th WSEAS international conference on Applications of electrical engineering
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cryptographic modules can be implemented in both hardware and software. Although software cryptographic implementations are cost-effective and more flexible, they seem to provide a much lower level of security in relation to their hardware equivalents. The uncontrolled memory access, the vulnerabilities imposed by the OS and the facility of modifying software implementations are some of the security barriers of software cryptographic modules. This works deals with the exploitation of security architectures via software and hardware implementations. Especially it is centers in the advantages and the trade-offs of each one of the two alternatives integration approaches.