Cryptography Handbook

The Cryptography Handbook is designed to be a quick study guide for a product development engineer, taking an engineering rather than theoretical approach. In this series, we start with a general overview and then define the characteristics of a secure cryptographic system. We then describe various cryptographic concepts and provide an implementation-centric explanation of physically unclonable function (PUF) technology. We hope that this approach will give the busy engineer a quick understanding of the basic concepts of cryptography and provide a relatively fast way to integrate security in his/her design.

Chapter 1: Cryptography: How It Helps in Our Digital World

Gain a basic understanding of how cryptography works and how cryptography can help you protect your designs from security threats.

Read Chapter 1 ›

Chapter 2: Cryptography: Fundamentals on the Modern Approach

Learn about the fundamental concepts behind modern cryptography, including how symmetric and asymmetric keys work to achieve confidentiality, identification and authentication, integrity, and non-repudiation.

Read Chapter 2 ›

Chapter 3: Cryptography: A Closer Look at the Algorithms

Get more details about how cryptographic algorithms are implemented and how an asymmetric key algorithm can be used to exchange a shared private key.

Read Chapter 3 ›

Chapter 4: Cryptography: Understanding the Benefits of the Physically Unclonable Function (PUF)

Find out how the physically unclonable function, or PUF, creates keys that are generated on-demand and then instantaneously erased once used in order to deliver strong protection in cryptographic applications.

Read Chapter 4 ›

Chapter 5: Cryptography: Is a Hardware or Software Implementation More Effective?

Get a comparison of hardware versus software implementations of cryptography, and find out why dedicated cryptographic hardware provides a better solution.

Read Chapter 5 ›

Chapter 6: Cryptography: Planning for Threats and Countermeasures

Take a closer look at some of the threats to connected systems and what kind of planning you need to do to protect your devices.

Read Chapter 6 ›

Chapter 7: How Secure Authenticators and Coprocessors Can Simplify Cryptography

Learn how secure authenticators and coprocessors can simplify the implementation of cryptography for your design.

Read Chapter 7 ›