E-Learning Classical Cryptography
- Cryptography Basics
- Caesar Cipher
- Vigenère Cipher
- One-Time Pad
E-Learning Modern Cryptography
- Who are Alice and Bob?
- Symmetric, asymmetric and hybrid encryption
- DES (Data Encryption Standard)
- AES (Advanced Encryption Standard)
- Diffie-Hellman Key Exchange
- RSA (Rivest, Shamir, Adleman)
What Is Encryption?
Encryption is about transmitting information in such a way that it can only be read by the sender and recipient. If someone in between tries to access the data, they cannot decrypt it.
Several different methods are available for this purpose, which can be divided into symmetric, asymmetric, and hybrid encryption methods. The most common encryption mechanisms include the Advanced Encryption Standard (AES) and RSA.
Why Is Encryption Needed?
Encryption is found in almost all areas of life and is becoming increasingly important. For example, customers want to be sure that their bank data is kept secret when they shop online. In the automotive sector, for example, encryption is central to the secure transmission of updates. Data security – and therefore encryption – also plays an important role in e-mail correspondence and private chats.
Therefore, software developers must have knowledge about IT security during implementation, in particular since encryption is becoming an increasingly omnipresent topic. Thus, an increasing use of encryption methods can be seen. Encryption has also gained in importance due to the Internet: systems are more and more connected. This has enormous advantages but carries also the risk of third parties interfering with communication and thus misusing or manipulating it.
There will definitely be major development steps in the area of encryption in the future. Keywords in this context already important today are digital factory, networked production, autonomous driving and software updates.
How Is Encryption Related to Embedded Systems?
Embedded systems always work through special software, which must be protected in such a way that not everyone can access it and make changes. This means that during the IT security process, encryption must be used to guarantee that the various components cannot be accessed directly.
As embedded systems become more and more networked, there are different levels of encryption. One is normal communication, where data is encrypted. On the other hand, the reprogramming of embedded systems. In the automotive sector, the latter in particular plays an important role, as do error reactions, for example in communication with traffic lights.
What Do You Learn About Encryption in the Embedded Academy E-Learning?
The course on encryption is divided into two e-learnings. First, there is a general introduction to the topic and a historical overview. The second learning unit then moves on from this historical encryption to modern methods. Here, using the example of Alice and Bob, A to B encryption from the sender (A) to receiver (B) is explained for the three basic types (symmetric, asymmetric, and hybrid) and further illuminated using concrete methods.
With the help of the e-learnings, learners understand the different procedures. They then know how they are applied, which group they belong to, and can evaluate which mechanism make the most sense for which application during implementation.