Hardware Reference
In-Depth Information
Exploring the differences between
hardware and software cryptography
In the following sections, we'll discuss the advantages and disadvantages of using
hardware-based cryptography. The remaining projects in the topic will use embedded hard-
ware cryptographic devices, so it's important to know their capabilities and their limita-
tions. Refer to Chapter 1 , Creating Your BeagleBone Black Development Environment , for
additional resources on cryptography and terms used in this section.
Search WWH ::




Custom Search