Military Embedded Systems

Escrypt, Inc.

Articles 1 - 1

Protecting embedded systems from unauthorized software modifications - Story

January 04, 2010
Today's embedded avionics and other security-critical systems increasingly face the requirement for heightened security. Hence, a software downloading/flashing scheme utilizing digital signatures and the Rivest Shamir Adleman (RSA) and Elliptic Curve Cryptography (ECC) algorithms is helping to prevent unauthorized access and counterfeiting.
Articles 1 - 1