This article is an overview of cryptography and its application across different components within a typical technology platform. It discusses different cryptographic approaches and touches on trending requirements for cryptography. This is a fast developing field that is required across different platforms with differing styles of interactions. This article discusses the basis of cryptography which can then be adapted into any cryptographic requirement. A case study explains how cryptography is used within cryptographic hardware.
Please sign in or register for FREE
Sign in to E&T Cyber Security Hub
Register to E&T Cyber Security Hub
E&T Cyber Security Hub brings together engineers and cyber security specialists to share practical know-how. With content created ‘by engineers, for engineers,’ it provides peer-reviewed technical information, real-world insights, lessons learnt and case studies, as well as tools for networking and knowledge-sharing, profiles of experts and the opportunity for companies to showcase their expertise.