SPRADO0 November 2024 F29H850TU , F29H859TU-Q1
Cryptography is at the heart of embedded security, and is the fundamental means by which cybersecurity properties such as confidentiality, integrity and authenticity can be protected. Confidentiality requires encryption using strong algorithms that cannot be deciphered or broken by unauthorized parties. The sender converts the data to be transmitted into undecipherable ciphertext using a cryptographic algorithm and an encryption key, and the receiver must subsequently use the corresponding decryption algorithm and a decryption key to convert the ciphertext back into the original data. Integrity and authenticity are related cybersecurity properties that focus on establishing trust. Integrity ensures that data has not been altered or corrupted during transmission or storage, while authenticity ensures that the data comes from a legitimate and trusted source. Hashing functions and digital signatures are needed to establish the integrity and authenticity of code or data. To achieve cybersecurity goals and effectively protect the confidentiality, integrity and availability of secured assets, one or more of these cryptographic functions can be used to build an embedded cybersecurity solution.