Smart cards and IoT devices use cryptography in combination with other tools to provide security services such as confidentiality, integrity, availability, authentication and identification. Modern cryptographic techniques are based on mathematical problems which are impossible to solve in polynomial time. However, implementation of cryptographic algorithms in silicon have left them open to attack from adversaries who use techniques such as fault analysis, power analysis and timing analysis to correctly determine cryptographic keys.

Introduction to Cryptography covers:

Cryptographic training is part of the Embedded Security Training Series. For further information on training and training dates, please use our contact form below:

[wpforms id=”143″ title=”true”]