Brief Background in Security and Cryptography

  • Marko Wolf


This chapter briefly provides necessary background knowledge in security and cryptography. It provides a brief introduction into symmetric-key and asymmetrickey cryptography, introduces several cryptographic primitives, and provides the basics in Trusted Computing and cryptanalysis. This chapter further gives brief descriptions of several cryptographic schemes that are important in the automotive context. It lastly gives some rough ideas for execution performance and required resources for cryptographic implementations in hardware and software. Parts of this chapter are based on published research in [AES+07, EGP+07, WWW07].


Hash Function Elliptic Curve Block Cipher Advance Encryption Standard Message Authentication Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Vieweg+Teubner | GWV Fachverlage GmbH 2009

Authors and Affiliations

  • Marko Wolf

There are no affiliations available

Personalised recommendations