Setec Astronomy: Too Many Secrets

Aug. 4, 2003
Sneakers, Chapter 9: Bishop (Robert Redford) and company have their hands on the code-breaking machine from Setec Astronomy. It's a great movie, especially if you are paranoid. In this plot, the government and the mob are both out to get...

Sneakers, Chapter 9: Bishop (Robert Redford) and company have their hands on the code-breaking machine from Setec Astronomy. It's a great movie, especially if you are paranoid. In this plot, the government and the mob are both out to get you.

The key (pun intended) to it all is the encryption. Encryption is also a hot topic among embedded developers. It's central to digital rights management (DRM), the International PGP (Pretty Good Privacy, www.pgpi.org), the Advanced Encryption Standard (AES), virtual private networks (VPNs), and the Trusted Computing Platform Association (TCPA, www.trustedcomputing.org).

As more security measures move into the embedded space, being well versed in encryption technology is growing more important. The Recording Industry Association of America (RIAA, www.riaa.com) wants DRM in every audio device. The Motion Picture Association of America (MPAA, www.mpaa.org) is pushing for end-to-end 1394 video encryption, and Microsoft would love a PC that only runs a trusted Windows operating system. It's a legal and moral quagmire.

Legal and moral consequences aside, embedded developers such as yourselves will design and test the hardware and software that makes things secure. Secure hardware support is critical because software can be modified. Processors with built-in security support are becoming more common. Hardware encryption acceleration is another hot area as the amount of encrypted bandwidth increases. Staying on top of the technology will be critical to choosing and building the proper support. Check out software-only tools like PGP for codes, digital signature, or encryption if you're unfamiliar with how the technology works.

Breaking codes may be the source of fodder for films. Cracking a password is possible in many cases, but usually encryption will maintain the necessary level of security. Attacks simply target the weakest links, whether it's software, hardware, or people.

In the end, Mother (Dan Akroyd) winds up with a Winnebago. Abbott (James Earl Jones) promises to pursue peace on earth for Whistler (David Strathairn). And, according to Abbott, "The whole thing never happened." Or did it?

About the Author

William G. Wong | Senior Content Director - Electronic Design and Microwaves & RF

I am Editor of Electronic Design focusing on embedded, software, and systems. As Senior Content Director, I also manage Microwaves & RF and I work with a great team of editors to provide engineers, programmers, developers and technical managers with interesting and useful articles and videos on a regular basis. Check out our free newsletters to see the latest content.

You can send press releases for new products for possible coverage on the website. I am also interested in receiving contributed articles for publishing on our website. Use our template and send to me along with a signed release form. 

Check out my blog, AltEmbedded on Electronic Design, as well as his latest articles on this site that are listed below. 

You can visit my social media via these links:

I earned a Bachelor of Electrical Engineering at the Georgia Institute of Technology and a Masters in Computer Science from Rutgers University. I still do a bit of programming using everything from C and C++ to Rust and Ada/SPARK. I do a bit of PHP programming for Drupal websites. I have posted a few Drupal modules.  

I still get a hand on software and electronic hardware. Some of this can be found on our Kit Close-Up video series. You can also see me on many of our TechXchange Talk videos. I am interested in a range of projects from robotics to artificial intelligence. 

Sponsored Recommendations

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!