Hardware Reference
In-Depth Information
Summarizing the hardware versus software debate
So, which is the better route? As with most complex technologies the correct answer is:
it
depends
. For a truly embedded system, one that can't spare even a few extra bytes, a hard-
ware security chip may be your only option if you can't upgrade your microprocessor. Also,
if there is a high threat of leaking your key due to a software vulnerability, then the separate
crypto co-processor might help you. However, if an attacker can gain physical access to
your device, then they might be able to extract the key with hardware-based attacks. Lastly,
if transparency is paramount for you to verify the lack or existence of backdoors, then only
fully open source software and hardware devices will satisfy you.