Based on the historical development of so-called Crypto Chips, the current Transformation of Cryptography shows numerous changes, innovations and new process designs in the field of Cryptography, which also need to be integrated in a hardware design of Microprocessors and Microcontrollers for a Secure Embedded System.
Using the example of the encrypting Echo protocol, a design of a hardware architecture based on three Chips is presented: The central Echo Chip #1 represents a "Trusted Executio.
Based on the historical development of so-called Crypto Chips, the current Transformation of Cryptography shows numerous changes, innovations and new process designs in the field of Cryptography, which also need to be integrated in a hardware design of Microprocessors and Microcontrollers for a Secure Embedded System