The Cryptography Handbook is designed to be a quick study guide for a product development engineer, taking an engineering rather than theoretical approach. In this series, we start with a general overview and then define the characteristics of a secure cryptographic system. We then describe various cryptographic concepts and provide an implementation-centric explanation of physically unclonable function (PUF) technology. We hope that this approach will give the busy engineer a quick understanding of the basic concepts of cryptography and provide a relatively fast way to integrate security in his/her design.
Chapter 1: Cryptography: How It Helps in Our Digital World
Gain a basic understanding of how cryptography works and how cryptography can help you protect your designs from security threats.
Chapter 2: Cryptography: Fundamentals on the Modern Approach
Learn about the fundamental concepts behind modern cryptography, including how symmetric and asymmetric keys work to achieve confidentiality, identification and authentication, integrity, and non-repudiation.
Chapter 3: Cryptography: A Closer Look at the Algorithms
Get more details about how cryptographic algorithms are implemented and how an asymmetric key algorithm can be used to exchange a shared private key.
Chapter 4: Cryptography: Understanding the Benefits of the Physically Unclonable Function (PUF)
Find out how the physically unclonable function, or PUF, creates keys that are generated on-demand and then instantaneously erased once used in order to deliver strong protection in cryptographic applications.
Chapter 5: Cryptography: Is a Hardware or Software Implementation More Effective?
Get a comparison of hardware versus software implementations of cryptography, and find out why dedicated cryptographic hardware provides a better solution.
Chapter 6: Cryptography: Planning for Threats and Countermeasures
Take a closer look at some of the threats to connected systems and what kind of planning you need to do to protect your devices.
Chapter 7: How Secure Authenticators and Coprocessors Can Simplify Cryptography
Learn how secure authenticators and coprocessors can simplify the implementation of cryptography for your design.