Software algorithms secure embedded designs
- Autor:Ella Cai
- Solte em:2017-04-27
Segger has introduced a library of cryptographic algorithms written entirely in C.
Called emCrypt, it includes block ciphers, hashes, MACs, and digital signatures required to meet the demanding cryptographic needs of embedded devices.
Software algorithms secure embedded designsHaving been designed from the ground up for use in memory-constrained embedded systems, emCrypt uses minimal resources in respect of memory footprint (RAM/ROM) as well as CPU utilisation.
It can be used on MCUs as well as on larger systems with lots of memory, as well as on tablets and PCs.
Hardware acceleration for various popular MCU families such as STM32, Kinetis, EFM32 and LPC18S/43S is available.
Test applications and example code come with the product and make it very easy to use. Executables for Windows and Linux are available as utilities for download free of charge.
The algorithms are available for use in any application on 16/32 or 64-bit processors, under simple non-GPL, non-viral licensing terms.
Called emCrypt, it includes block ciphers, hashes, MACs, and digital signatures required to meet the demanding cryptographic needs of embedded devices.
Software algorithms secure embedded designsHaving been designed from the ground up for use in memory-constrained embedded systems, emCrypt uses minimal resources in respect of memory footprint (RAM/ROM) as well as CPU utilisation.
It can be used on MCUs as well as on larger systems with lots of memory, as well as on tablets and PCs.
Hardware acceleration for various popular MCU families such as STM32, Kinetis, EFM32 and LPC18S/43S is available.
Test applications and example code come with the product and make it very easy to use. Executables for Windows and Linux are available as utilities for download free of charge.
The algorithms are available for use in any application on 16/32 or 64-bit processors, under simple non-GPL, non-viral licensing terms.