Professional Documents
Culture Documents
LATEST FROM
EMBEDDED
REVOLUTION
Th
Clo
up
Au
20
Em
Re
SPO
CO
As
Ex
Ca
Au
20
Re
Cryptographic
Algorithms MY PROFILE
Apr 30th, 2020 COMPANY LOG OUT
RESOURCES MEMBERS DIRECTORY WEBINARS SEARCH
Chapter 3 of the Cryptographic Handbook
ANALOG POWER EMBEDDED TEST & INDUSTRIAL AUTOMOTIVE DATA
delves into how
MEASUREMENT
modern cryptographic
AUTOMATION SHEETS
algorithms are implemented.
Zia Sardar
Related To: Maxim Integrated
SPO
CO
Fo
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 1/16
17/08/2021 Cryptographic Algorithms | Electronic Design
M
De
Au
Ind
This article is part of the Communication
Au
Series: The Cryptography Handbook
Tu
Em
M In the last two articles, we covered the basic concepts
Au and two basic types of cryptography. In this article,
20
Em we will look at specific implementation details of the
Re
most common cryptographic algorithms. It starts
W with the fundamental XOR function and then
th
discusses the more complex symmetric and
Be
Au asymmetric algorithms in use today.
20
Ind The article concludes with a review of how an
Au
asymmetric key algorithm can be used to exchange a
NV
shared private key. This enables the use of faster
La
Se symmetric key algorithms to exchange bulk-
Au encrypted data without developing elaborate key
Em
Re exchange systems.
Se XOR Function
FP
RI
XOR (exclusive or) is a vital logical operation that’s
Au
20 used in various capacities in a lot, if not all,
Em
Re
cryptographic algorithms. Figure 1 shows how this
function works. Having this basic understanding is
Ho
to
required before reviewing any of the algorithms.
Se
Au
12t
20
An
W
Se
M
Au
20
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 2/16
17/08/2021 Cryptographic Algorithms | Electronic Design
Em
Re
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 3/16
17/08/2021 Cryptographic Algorithms | Electronic Design
2. The flow diagram presents the basic concept of secure hash generation.
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 4/16
17/08/2021 Cryptographic Algorithms | Electronic Design
3. The SHA-256 function for secure hash generation follows this process.
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 5/16
17/08/2021 Cryptographic Algorithms | Electronic Design
4. This block diagram shows the SHA3-256 function for secure hash generation.
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 6/16
17/08/2021 Cryptographic Algorithms | Electronic Design
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 7/16
17/08/2021 Cryptographic Algorithms | Electronic Design
AES Algorithm
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 8/16
17/08/2021 Cryptographic Algorithms | Electronic Design
DES Algorithm
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 9/16
17/08/2021 Cryptographic Algorithms | Electronic Design
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 10/16
17/08/2021 Cryptographic Algorithms | Electronic Design
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 11/16
17/08/2021 Cryptographic Algorithms | Electronic Design
ECDSA Algorithm
9. The ECDSA (Elliptic Curve Digital Signature Algorithm) helps verify digital
signatures.
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 12/16
17/08/2021 Cryptographic Algorithms | Electronic Design
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 13/16
17/08/2021 Cryptographic Algorithms | Electronic Design
10. An ECDH key exchange allows for two parties to establish a shared key for
communication.
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 14/16
17/08/2021 Cryptographic Algorithms | Electronic Design
RELATED
Crypt
Fund
Apr 16
Embe
Revolu
SPONS
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 15/16
17/08/2021 Cryptographic Algorithms | Electronic Design
CONTE
Secu
Auth
for S
Dec 10
Indust
Autom
About Us
Contact Us
Advertise
California Do Not Sell
Privacy & Cookie Policy
Terms of Service
https://www.electronicdesign.com/technologies/embedded-revolution/article/21130198/maxim-integrated-cryptographic-algorithms 16/16