Detail publikace

Cryptography in ultra-low power Microcontroller MSP430

FUJDIAK, R. MLÝNEK, P. MIŠUREC, J. RÁŠO, O.

Originální název

Cryptography in ultra-low power Microcontroller MSP430

Anglický název

Cryptography in ultra-low power Microcontroller MSP430

Jazyk

en

Originální abstrakt

This article describes an implementation for the method from Texas Instruments for a random number generator in the ultra-low power microcontroller MSP430x5xx Families and the analysis of this generator in the concrete microcontroller MSP430f5438A. The generator may be used to generate numbers for cryptography security methods (for example in the cryptosystem Diffie-Hellman). A short theoretical introduction to the cryptography generators, a description of implementation, some practice examples and an analysis (and its description) for con-crete example of the generator are provided in this article.

Anglický abstrakt

This article describes an implementation for the method from Texas Instruments for a random number generator in the ultra-low power microcontroller MSP430x5xx Families and the analysis of this generator in the concrete microcontroller MSP430f5438A. The generator may be used to generate numbers for cryptography security methods (for example in the cryptosystem Diffie-Hellman). A short theoretical introduction to the cryptography generators, a description of implementation, some practice examples and an analysis (and its description) for con-crete example of the generator are provided in this article.

Dokumenty

BibTex


@article{BUT104302,
  author="Radek {Fujdiak} and Petr {Mlýnek} and Jiří {Mišurec} and Ondřej {Rášo}",
  title="Cryptography in ultra-low power Microcontroller MSP430",
  annote="This article describes an implementation for the method from Texas Instruments for a random number generator in the ultra-low power microcontroller MSP430x5xx Families and the analysis of this generator in the concrete microcontroller MSP430f5438A. The generator may be used to generate numbers for cryptography security methods (for example in the cryptosystem Diffie-Hellman). A short theoretical introduction to the cryptography generators, a description of implementation, some practice examples and an analysis (and its description) for con-crete example of the generator are provided in this article.",
  address="Seventh Sense Research Group",
  chapter="104302",
  institution="Seventh Sense Research Group",
  number="8",
  volume="6",
  year="2013",
  month="december",
  pages="398--404",
  publisher="Seventh Sense Research Group",
  type="journal article - other"
}