Communications security is paramount in defense applications. Thus cryptographic algorithms are employed everywhere, from smart cards to hand-held field radios to central servers. The cryptography has to be strong (no-one can break the algorithm), correctly and securely implemented (no-one can hack the code), and efficient (you don't notice it is being used).
It can be very expensive to deploy high-grade cryptographic applications. Much of the cost is to meet certification requirements, where… CONTINUE READING