Embedded System Design


Data Encryption Standard – DES Encryption Algorithm

Data Encryption Standard (DES) or DES Encryption Algorithm is a technique by which a message is scrambled into an indecipherable stream of bits for transmission. Data Encryption Standard also called DES is a block cipher which forms a code for secret encryption. DES was selected by the National Bureau of Standards as official Federal Information […]

Read more >>> Data Encryption Standard – DES Encryption Algorithm

The Advanced Encryption Standard (AES) is an encryption algorithm for securing information in commercial transactions in the private sector. AES is a symmetric key encryption standard adopted by the U.S. government. The Advanced Encryption Standard consists of three block ciphers. They are: AES-128, AES-192, and AES-256. Each of the above standard ciphers is 128-bit block […]

Read more >>> Advanced Encryption Standard – AES Encryption Algorithm

Asymmetric encryption algorithms employ a pair of keys, one is a public key and the other one is a private key. Asymmetric encryption algorithm also called as public key cryptography simplifies the management of symmetric keys. It can be used to establish the repudiation of origin and receipt. Some of the Asymmetric Encryption Algorithms are […]

Read more >>> Asymmetric Encryption Algorithms

Symmetric key encryption uses same key, called secret key, for both encryption and decryption. Users exchanging data keep this key to themselves. Message encrypted with a secret key can be decrypted only with the same secret key. The algorithm used for symmetric key encryption is called secret-key algorithm. Since secret-key algorithms are mostly used for […]

Read more >>> Symmetric Key Encryption Algorithms

Public key cryptographic system consists of two separate keys, one to lock or encrypt the plain text, and the other to unlock or decrypt the ciphertext. One of the key is public key and the other is a private key. The lock or encryption key of the Public Key Cryptographic system enables private communication from […]

Read more >>> Public Key Cryptographic System

Symmetric-Key Cryptography consists of a key called symmetric key, with the help of which both encryption and decryption processes are carried out. The algorithms used in the Symmetric-key cryptography are often termed as symmetric key ciphers or private-key ciphers or secret-key ciphers or conventional ciphers etc. In Symmetric Key Cryptosystems, a single key is used […]

Read more >>> Symmetric Key Cryptography

Security Key Issuing protocol sets multiple key privacy authorities in addition to Key Generating center to protect the privacy of users private keys. Thus, Security key issuing protocol computes user’s private keys. The key escrow problem of ID-based cryptography is solved by the Security key issuing protocol. Therefore Security Key issuing is more important in […]

Read more >>> Secure Key Issuing in ID-Based Cryptography

Identity Based Cryptography results in an Identity Based signature Scheme resulting in secure and properly authenticated systems. In Identity based cryptography scheme, data is encrypted using an arbitrary string as the key. For decryption, decryption key is mapped to the arbitrary encrypted key by a key authority. Identity based cryptography is a type of public-key […]

Read more >>> Identity-based Cryptography for Secure Digital Signature Authentication

Quantum Cryptography poses a method for secure key exchange over an insecure channel based on the nature of photons, which have polarization. Quantum cryptography describes the use of quantum mechanical effects i.e. in quantum communication and quantum computation to perform cryptographic tasks or to break cryptographic systems. Quantum cryptography has a special defense against eaves […]

Read more >>> Quantum Cryptography for Secure Communication System

Multivariate Cryptography is a family of public key cryptosystems. Multivariate cryptography is the generic term for asymmetric cryptographic primitives based on multivariate polynomials over finite fields. Multivariate polynomials could be defined over both ground field and extension field. The degree two polynomials can be called as multivariate quadratics. Multivariate cryptography thus called, Multivariate quadratics can […]

Read more >>> Multivariate Cryptography & Multiple Encryption Security

Visual cryptography is a cryptographic technique which allows visual information i.e. pictures, text, etc. to be encrypted in such a way that decryption can be done by human visual system without the use of computers. Visual Cryptography is a visual secret sharing scheme, where an image was broken up into n shares. The individual with […]

Read more >>> Visual Cryptography Security for Human Authentication

In order to establish proper and secure communication between two parties, security is needed. A standard protocol that ensures security is therefore required to establish secure communication. One of such protocol is Secure Remote Password protocol. Secure Remote Password Protocol (SRP) is a secure password based authentication and key exchange protocol. It doesn’t require a […]

Read more >>> Secure Remote Password Protocol (SRP)

In order to have a proper and secure communication, it is necessary to use transient key cryptography when we are working with critical issues. Generation of Digital Signatures is important to provide security at both the sender and receiver sides during the transmission if data. Transient key cryptography is a cryptographic technique that ensures security […]

Read more >>> Transient-Key Cryptography for Digital Signature

GigE Vision is an interface standard for high-performance machine vision industrial cameras. It provides a framework for transmitting high-speed video and related control data over Ethernet networks. GigE Vision is a camera interface standard developed using the Gigabit Ethernet communication protocol. GigE Vision allows for fast image transfer using low cost standard cables over very […]

Read more >>> GigE Vision Interface for Machine Vision Industrial Cameras

Ultra low power (ULP) RF specialist Nordic Semiconductor unveiled the new Nordic nRF2460 Wireless Audio Streamer IC that offers unique, class-leading power optimization and performance specifically for cost-sensitive battery-powered mono (single channel) wireless audio applications such as microphones (e.g. home karaoke and conference), subwoofers (home cinema), musical instruments (wireless audio adapters), and gaming (e.g. singing […]

Read more >>> Wireless Audio Streamer – Low-Power PCM Digital Audio Streaming System

The PCI-Express standards-setting organization is creating a thin interconnect that would link mobile devices such as smartphones and tablets to external peripherals. The PCI Express cable interconnect will enable data transfers between host mobile devices and external devices at speeds of up to 8Gbps, said Al Yanes, president and chairman of the PCI-Special Interest Group […]

Read more >>> PCI Express Thinner Interconnect for Mobile Devices

High Dynamic Range (HDR) imaging is a technique levels captured by a digital camera. In image processing, computer graphics, and photography, high dynamic range imaging (HDRI) is a set of techniques that allow a greater dynamic range of luminance between the lightest and darkest areas of an image than current standard digital imaging techniques or […]

Read more >>> High Dynamic Range Imaging – HDR Video Camera Design

Although High Dynamic Range (HDR) imaging has been the subject of significant research over the past fifteen years, the goal of acquiring cinema-quality HDR images of fast-moving scenes using available components has not yet been achieved. High Dynamic Range (HDR) imaging and video cameras provide extremely high quality of imaging and video. Contrast Optical Design […]

Read more >>> Real-Time HDR Video Camera System – High Dynamic Range Imaging (HDRI)

The new BU21023/BU21024 series of high-speed, high noise immunity, low-voltage Resistive Touchscreen Controllers is now available from ROHM Semiconductor. These new Resistive Touchscreen Controllers are the industry’s first to enable multi-touch (two-point) operation and intuitive gesture control, including pinching, spreading and rotating – previously possible only with more expensive capacitive touchscreen display systems. The increasing […]

Read more >>> Multi-Touch Controller for Resistive Touchscreen Display with Gesture Control

Lytro has unveiled a new light field camera sensor technology that promised to revolutionize how cameras capture shots. Its new sensor captures light fields independent of the direction of the camera and avoids the need to focus the shot at the time it’s taken. Instead, photographers would just have to pick the focal point in […]

Read more >>> Light Field Image Sensor for Light Field Cameras

Showing results 41 - 60 of 136 for the category: Embedded System Design.