Cryptographic Algorithms That Embedded Engineers Need to Know

Cryptographic Algorithms That Embedded Engineers Need to Know

Follow and star our public account to access exciting content Source: Online materials With the advent of artificial intelligence and the Internet of Things, data applications have become more frequent. How should data security be protected? What software encryption algorithms are available, and in what areas are these algorithms applied? As you read on, you … Read more

A Discussion on Zen Buddhism and Cryptography

A Discussion on Zen Buddhism and Cryptography

It is well known that the stability of the world’s financial infrastructure relies on the RSA encryption algorithm used by banks. This algorithm ultimately hinges on the difficulty of prime factorization. Since factorizing large numbers is a challenging task, almost impossible to accomplish manually, even computers would take thousands of years to crack a large … Read more

Understanding Elliptic Curve Cryptography with Ease

Understanding Elliptic Curve Cryptography with Ease

In the field of mathematics, I tried my best to explain the mathematical principles of cryptographic algorithms, but I failed, leading to the need to write a second version (Did someone not understand? Let’s try explaining the RSA encryption algorithm again). These are just arithmetic. Something that sounds sophisticated like elliptic curves, I thought I … Read more

An Overview of Cryptographic Encryption Algorithms

An Overview of Cryptographic Encryption Algorithms

This article introduces commonly used cryptographic algorithms in daily development. abstract.png Classical Cryptography Classical cryptography typically employs simple techniques such as substitution (replacing letters in plaintext with other letters) and transposition (rearranging the order of letters in plaintext), without the need for complex machines or algorithms. Therefore, its security is insufficient and easily compromised. Caesar … Read more

wolfSSL: A Lightweight Security Choice, An SSL/TLS Framework Designed for Embedded Environments

wolfSSL: A Lightweight Security Choice, An SSL/TLS Framework Designed for Embedded Environments

In the context of increasingly severe cybersecurity threats, how to protect the communication security of embedded devices, mobile applications, and even enterprise systems has become a pressing issue for developers. wolfSSL, as an efficient, lightweight, and industry-standard compliant SSL/TLS library, has gradually become the preferred choice for security in embedded and resource-constrained environments due to … Read more

Functional Safety in Embedded Systems – Architecture Design for Safety

Functional Safety in Embedded Systems - Architecture Design for Safety

Requirements and architecture have always been key factors determining the quality of software systems. Requirement analysis and architectural design are critical stages where functional safety and information security begin to converge. It is essential to approach design comprehensively from both fault and threat perspectives.The following content is excerpted from the “Forum Collection,” authored by Wu … Read more

Microcontroller RTOS Real-Time Task Scheduling: Multi-Task Cooperation and Priority Management

Microcontroller RTOS Real-Time Task Scheduling: Multi-Task Cooperation and Priority Management

Microcontroller RTOS Real-Time Task Scheduling: Multi-Task Cooperation and Priority Management Today, we will discuss something “advanced”: the Real-Time Operating System (RTOS) for microcontrollers.If you have used a microcontroller to run bare-metal code, you may have encountered the problem of needing to handle multiple tasks simultaneously, such as key detection, sensor data collection, and serial communication. … Read more

Traffic Dispatch Engine: Real-Time Path Planning Implementation in Go

Traffic Dispatch Engine: Real-Time Path Planning Implementation in Go

Click the “blue text” above to follow us Yesterday, Xiao Wang called me: “Brother Feng, help! Our traffic dispatch system crashed, thousands of vehicles are requesting paths simultaneously, and the server is as slow as a snail!” After hearing his description, I laughed. Isn’t this a typical high-concurrency scenario? It’s just the right time to … Read more

Standard Low Power Design Methods (Part 1)

Standard Low Power Design Methods (Part 1)

There are many power reduction methods that have been in use for some time, and these are mature technologies. This chapter describes some methods for low power design. Clock Gating A significant portion of the dynamic power consumption in a chip is wasted in clock balancing. More than 50% of dynamic power can be wasted … Read more