MCU increases security of e-passports

October 2006
Electronics Weekly;10/4/2006, Issue 2259, p26
Trade Publication
The article presents information about the ST19NR66 dual-interface secure microcontroller developed by STMicroelectronics NV. ST19NR66 is compliant with International Civil Aviation Organization requirements for the storage of biometric records and information in ID cards. It is constituted of a 1088-bit modular arithmetic processor for public-key cryptography, an enhanced DES engine, and AES-128 software-library capability for advanced encryption service.


Related Articles

  • Session Keys Management System between Smart Card and Machine. Thida, Moe // Proceedings of World Academy of Science: Engineering & Technolog;Feb2009 Supplement, Vol. 50, p1191 

    Although smart cards are becoming in an increasing number of applications, there is small literature of implementation issues for smart cards. Smart cards are used in many applications that require a tamper resistant area. Therefore, smart cards are used that Cryptography has to provide...

  • What is Encryption? Reinhold, Arnold G. // America's Network;12/01/99, Vol. 103 Issue 18, p12S 

    Provides an excerpt from the paper titled Strong Cryptography: The Global Tide of Change, published in September 17, 1999 by the Cato Institute.

  • CRYPTOLOGY AND COMMUNICATION SECURITY. Kant, Shri // Defence Science Journal;2012, Vol. 62 Issue 1, following p31 

    An introduction is presented in which the editor discusses various reports within the issue on topics including steganalysis, crypto algorithms and data encryption standards (DES).

  • THE CLIPPER ENCRYPTION SYSTEM. Denning, Dorothy E. // American Scientist;Jul/Aug93, Vol. 81 Issue 4, p319 

    Provides information on the emergence of the clipper encryption system in the U.S. Background on cryptography; Function of and benefits from the encryption technology; Consequences of the clipper encryption system.

  • Complexity Bounds on General Hard-Core Predicates. Goldmann, Mikael; Naslund, Mats; Russell, Alexander // Journal of Cryptology;2000, Vol. 13 Issue 3, p177 

    A Boolean function b is a hard-core predicate for a one-way function f if b is polynomial-time computable but b(x) is difficult to predict from f(x). A general family of hard-core predicates is a family of functions containing a hard-core predicate for any one-way function. A seminal result of...

  • Quantum keys secure satellite data. Kren, Lawrence // Machine Design;12/10/98, Vol. 70 Issue 22, p58 

    Reports on the development of photon quantum keys. Weaknesses of existing encryption methods; Quantum cryptographic keys; Position and sequence of data bits.

  • Cryptology getting started EXAMPLE.  // Tech Directions;Oct2001, Vol. 61 Issue 3, p13 

    Presents procedures in making an encryption wheel using cryptology. Lists of materials needed; Details of the procedures in making a scytale; Illustration of examples.

  • The new cryptography. Sterling, Bruce // Fantasy & Science Fiction;May94, Vol. 86 Issue 5, p73 

    Focuses on cryptography, the science of ancient writing. Ancient places where cryptography was used; Use of cryptography during the war; Impact of technology on the context of the use of cryptography; Development of encryption as a business in the 1990s; Types and classes of cryptography.

  • Cryptographers safeguard message traffic in free space. Jones-Bey, Hassaun // Laser Focus World;May99, Vol. 35 Issue 5, p167 

    Focuses on quantum cryptography. Explanations from researcher Richard Hughes; Main advantage of working in a free space.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics