Encryption: Why Backdoors Are a Bad Idea
I have always had a passing interest in encryption and security. My PhD is on network file systems, where managing who has access to what data is an important aspect. I also spent the best part of a year working for a biometric security company (fingerprints and one-time-passcodes).
When Practical Cryptography by Bruce Schneier first came out, I immediately purchased a copy, at least partially because in that era it seemed plausible that the government might try to restrict knowledge of cryptography. It has never liked the idea that people might be able to talk without the government being able to listen, and it still doesn't. I think back then encryption software was still regarded as a "munition" and subject to full-on export regulation.
But the Internet came along and we all use cryptography every day, although it is hidden from us in our web browsers and our smartphones.
To read the full article, click here
Related Semiconductor IP
- ASIL B Compliant PCIe 5.0 Integrity and Data Encryption Security Module (select configurations)
- PCIe 6.0 Integrity and Data Encryption Security Module
- AES 256 encryption IP core
- PCIe 7.0 Integrity and Data Encryption (IDE) Security IP Module
- Advanced Encryption Standard compliant with FIPS 197
Related Blogs
- Why Aerospace Semiconductor Designers Are Taking a Page from Their Automotive Friends
- 5 reasons why MIPS M-class CPUs are ideal for IoT
- Why Verification IP Switching Costs Are a Myth
- Why Samsung are choosing ARM for next-generation IVI systems
Latest Blogs
- FiRa 3.0 Use Cases: Expanding the Future of UWB Technology
- Cadence Announces Industry's First Verification IP for Embedded USB2v2 (eUSB2v2)
- The Industry’s First USB4 Device IP Certification Will Speed Innovation and Edge AI Enablement
- Understanding Extended Metadata in CXL 3.1: What It Means for Your Systems
- 2025 Outlook with Mahesh Tirupattur of Analog Bits