Welcome to our site! EDAboard.com is an international Electronics Discussion Forum focused on EDA software, circuits, schematics, books, theory, papers, asic, pld, 8051, DSP, Network, RF, Analog Design, PCB, Service Manuals... and a whole lot more! To participate you need to register. Registration is free. Click here to register now.
I like the book "applied crytography" by Bruce Schneider
On a radio link you have to allow for some data gettting lost.
If you have a two way radio link you can detect packet loss and resend data,
you can use block encryption or stream encryption.
One a one way link you have to use block encryption so you can cope with some
block being lost.
With a two way radio link you can use public key cryptography where the two nodes
generate a key when they start talking to each other or both ends can have a key
in permanent memory read to use. Generating a public key tends to be
processor intensive.
If you have a one way link then you have to use a symetric algorithm and
install a key in both units before they can communicate.
If you want to prevent a unauthorised transmitter talking to your receiver
then thats a slightly different problem.
For high security it's best to use a well known algorithm since encryption
algorthims made by engineers and programmers tend to have problems that
are only obvious to crytography experts.
You need to consider your threat model. Are you trying to protect
against a radio enthusiast with a scanner from radio shack, an adversary
with money and expertise, the USA national security agency?
How valuable is the information you are protecting?
You need to balance security against the amount of memory and processing
power you need.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.