Latest from Embedded

ID 76795646 © Cybrain | Dreamstime.com
promo__id_76795646__cybrain__dreamstime
214182021 © Pavlineo | Dreamstime.com
promo__pavlineo_dreamstime_xxl_214182021
ID_316508515_alena_butusava, and Macronix
promo__id_316508515__alena_butusava__dreamstime
ID 348425309 © Yuriy Nedopekin | Dreamstime.com
datacenter_dreamstime_l_348425309
William Wong, 2025 © Endeavor Business Media
Do you recognize these charts
ID 22585047 © Agsandrew | Dreamstime.com
id_22585047__agsandrew__dreamstime_new
ID 361819724 © Anastasiia Torianyk | Dreamstime.com
chip_dreamstime_l_361819724
ID 107552055 © Scanrail | Dreamstime.com
car_headlight_dreamstime_l_107552055
Chapter1 62f288ef95f4c

Cryptography: Why Do We Need It? (Download)

Aug. 9, 2022
Download the PDF of Chapter 1 of "The Cryptography Handbook."

Check out the other chapters in the Communication Series:  The Cryptography Handbook

In our day-to-day lives, the use of cryptography is everywhere. For example, we use it to securely send passwords over vast networks for online purchases. Bank servers and e-mail clients save your passwords using cryptography as well. Cryptography is used to secure all transmitted information in our IoT-connected world, to authenticate people and devices, and devices to other devices.

If all of the cryptographic engines/functions stopped working for a day, modern life as we know it would stop. Bank transactions wouldn’t go through, internet traffic would come to a halt, and cell phones would no longer function. At this point, all of our important information would be exposed, and it then could be exploited to do unimaginable harm to us all.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!