Understanding secure connectivity in embedded systems and IoT devices

Email

How symmetric and asymmetric encryption and digital signatures work

Description

December 30, 2019
This video provides a ‘system-level’ view of how symmetric and asymmetric encryption work. It briefly discusses the main asymmetric cryptosystems – RSA and ECC – as well as explaining some core concepts such as entity and message authentication. It also discusses specific use cases of asymmetric encryption such as entity authentication, key exchange and digital signatures. Digital signatures also include some discussion of the role of secure hashing. There is no attempt to explain the mathematics used in encryption.

Additional information

arrow-topclosedeletedownloadmenusearchsortingArrowszoom-inzoom-out arrow-downarrow-uparrowCircle-leftarrowCircle-rightblockDiagramcalculatorcalendarchatBubble-doublechatBubble-personchatBubble-singlecheckmark-circlechevron-downchevron-leftchevron-rightchevron-upchipclipboardclose-circlecrossReferencedashdocument-genericdocument-pdfAcrobatdocument-webevaluationModuleglobehistoryClockinfo-circlelistlockmailmyTIonlineDataSheetpersonphonequestion-circlereferenceDesignshoppingCartstartoolsvideoswarningwiki