This course focuses on the implementation and application of cryptographic algorithms and protocols in embedded systems. An overview of the security problem and the science of cryptography and cryptanalysis is presented. The notion of the security perimeter in terms of physical access to assets in embedded hardware subsystems is studied. Students implement and apply various ciphers on 8-bit to 32-bit embedded platforms, comparing and contrasting computational and data throughout performance. Permission of instructor required.
Embedded Systems Security