The software architecture The security architecture The Kernel implementation Verification techniques Verification of the cryptLib kernel Random number generation Hardware encryption modules Conclusion Glossary Index
* The software architecture * The security architecture * The Kernel implementation * Verification techniques * Verification of the cryptLib kernel * Random number generation * Hardware encryption modules * Conclusion * Glossary * Index
Presents a novel design that allows for a great deal of customization, which many current methods fail to include; Details a flexible, comprehensive design that can be easily extended when necessary; Proven results: the versatility of the design has been effectively tested in implementations ranging from microcontrollers to supercomputers
This new book provides a detailed presentation of a flexible, platform-independent cryptographic security architecture which is suited to software, hardware and hybrid implementations. Using the design architecture, portions of the architecture can be replaced or updated with a minimum of effort, while guaranteeing a consistent interface and handling of objects.