Cryptographic Design Vulnerabilities
Computer
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
An open-source cryptographic coprocessor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Hi-index | 0.00 |
Cryptographic modules can be implemented in both hardware and software. Although software cryptographic implementations are cost-effective and more flexible, they seem to provide a much lower level of security in relation to their hardware equivalents. The uncontrolled memory access, the vulnerabilities imposed by the OS and the facility of modifying software implementations are some of the security barriers of software cryptographic modules. This works deals with the exploitation of security architectures via software and hardware implementations. Especially it is centers in the advantages and the trade-offs of each one of the two alternatives integration approaches.