Questions tagged [cryptographic-hardware]

Cryptographic hardware enables the handling of cryptographic tasks and/or problems using hardware instead of software solutions.

Cryptographic hardware enables the handling of cryptographic tasks and/or problems using hardware instead of software solutions. Some examples of cryptographic hardware are: cryptanalytic devices‎, encryption devices‎, encryption device accessories‎, smart cards‎, etc.

144 questions
8
votes
1 answer

How relevant are hardware implementations of crypto algorithms?

All of the SHA-3 finalists discussed speed and efficiency of a hardware implementation of their algorithms. How relevant are such details? I'm curious about who commercializes hardware that implements specific hashing algorithms, and who uses them.…
7
votes
1 answer

What is a smart card?

In many cryptographic protocols, some information is transmitted within smart cards. So, what is a smart card? Is it a physical card? What are they used for in cryptographic protocols?
user4665
  • 245
  • 3
  • 6
5
votes
2 answers

How many computations does it take to figure out the input if you know the function and you know its output to another known function?

I have no background in cryptography so excuse me if this question is a little basic or poorly defined. I'm trying to build a circuit using microcontrollers that implements a hash function of some arbitrary number that a user inputs. I want to make…
acbaum
  • 51
  • 1
4
votes
2 answers

Why EMI/EMC testing is necessary of Cryptographic Equipment?

In the Book, "Endpoint Security" Page 265, It includes Electromagnetic Interference / Electromagnetic Compatibility Testing in Heading Level 1. Why is it necessary for Cryptographic Equipment to have EMI/EMC Testing? What equipment is used to…
crypt
  • 2,417
  • 17
  • 32
3
votes
1 answer

Learning cryptography using a FPGA

I have a FPGA and am curious what cryptographic applications I can use with it. I'm just a hobbyist / security researcher and not a professional cryptographer. Since I'm creating my own curriculum, what cryptographic goals should I have with…
makerofthings7
  • 2,621
  • 1
  • 20
  • 36
3
votes
0 answers

When to chose hardware accelerated crypto for Big Data

if you were to recommend a cipher/mode configuration that emphasizes performance for your customers, would you recommend a hardware based accelerated solution over one that isn't? For big data at rest/transit what are some good cipher/mode choices…
Blaze
  • 551
  • 4
  • 13
3
votes
1 answer

Will I be able to (ab)use a FIDO U2F compliant hardware token to decrypt data?

I have heard good things about the emerging "FIDO U2F" standard. I am especially interested in having a JavaScript API for cryptographic functions that I can access through a plug-in in a browser. However, so far all my efforts to obtaining a…
mritz_p
  • 185
  • 1
  • 5
3
votes
4 answers

Are FPGAs faster than microcontrollers in cryptography?

So, for my capstone project, I've been working on a cryptographic algorithm accelerator on an FPGA. While it did get approved, I've been suggested to work on a more application-based idea that could incorporate my accelerator, where its use can be…
John T Doe
  • 31
  • 1
2
votes
1 answer

Are hardware encryption chips safer than their software counterparts for desktop apps?

Wouldn't accessing the hardware encryption chip be safer than relying on an encryption library? My question is prompted as a response to @SqueamishOssifrage replying on the "Properly securing a private key for remote storage" post, item #6 (I don't…
mar233
  • 23
  • 3
2
votes
2 answers

Why is it that researchers prefer finding secure software solutions over secure hardware solutions?

My understanding is crypto researchers tend to prefer solving a problem in software without the need for secure hardware. Why is this? What is the big problem with using secure hardware if the hardware components are cheap and can be easily made?
user1068636
  • 439
  • 2
  • 12
-1
votes
1 answer

application of algebra to cryptography

I have taken some courses on algebra like abstract algebra, linear algebra etc. I want to know more on the application of algebra to cryptography.I don't know if anyone can be of help. thanks.
TOP
  • 1
  • 2