Quantcast
Channel: Atmel | Bits & Pieces » cryptography
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Digital anonymity: The ultimate luxury item

Data is quickly becoming the currency of the digital society, of which we are all now citizens. Let’s call that “Digitopia.” In Digitopia, companies and governments just can’t get enough data. There is...

View Article



Image may be NSFW.
Clik here to view.

Shouldn’t security be a standard?

Security matters now more than ever, so why isn’t security a standard feature in all digital systems? Luckily, there is a standard for security and it is literally standards-based. It is called TPM....

View Article

Image may be NSFW.
Clik here to view.

ECDH key exchange is practical magic

What if you and I want to exchange encrypted messages? It seems like something that will increasingly be desired given all the NSA/Snowden revelations and all the other snooping shenanigans. The joke...

View Article

Image may be NSFW.
Clik here to view.

Don’t be an “ID-IoT”

Authentication may just be the “sine qua non” of the Internet of Things.  Let’s just come out and say it: Not using the most robust security to protect your digital ID, passwords, secret keys and...

View Article

Image may be NSFW.
Clik here to view.

Getting up close and personal with symmetric session key exchange

In today’s world, the three pillars of security are confidentiality, integrity (of the data), and authentication (i.e. “C.I.A.”). Fortunately, Atmel CryptoAuthentication crypto engines with secure key...

View Article


Image may be NSFW.
Clik here to view.

What is Ambient Security?

New technology and business buzzwords pop up constantly. Hardly a day goes by that you don’t see or hear words such as “cloud”, “IoT,” or “big data.” Let’s add one more to the list: “Ambient security.”...

View Article

Image may be NSFW.
Clik here to view.

Symmetric or asymmetric encryption, that is the question!

With the emergence of breaches and vulnerabilities, the need for hardware security has never been so paramount. Confidentiality — one of the three foundational pillars of security, along with data...

View Article

Image may be NSFW.
Clik here to view.

Atmel’s SAM L21 MCU for IoT tops low power benchmark

SAM L21 MCUs consume less than 940nA with full 40kB SRAM retention, real-time clock and calendar, and 200nA in the deepest sleep mode. The Internet of Things (IoT) juggernaut has unleashed a flurry of...

View Article


Image may be NSFW.
Clik here to view.

The CryptoShield is a dedicated security peripheral for the Arduino

This shield adds specialized ICs that will allow you to implement a hardware security layer to your Arduino project. With the insecurity of connected devices called into question time and time again,...

View Article


Image may be NSFW.
Clik here to view.

The “three-legged stool” of cryptography

Implementing true IoT requires a three-pronged approach, like a three-legged stool.  Implementing true security in Internet of Things (IoT) devices requires a three-pronged approach. Like a...

View Article
Browsing all 10 articles
Browse latest View live


Latest Images