This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Applications Directly Using Cryptography
May/June 2010 (vol. 14 no. 3)
pp. 84-87
Stephen Farrell, Trinity College Dublin
Sometimes, we need to use cryptographic protection from application layer code. Although requirements for this don't arise that often, when they do, they tend to be met in homegrown, ad hoc ways, and frequently without considering how to best use cryptographic APIs or do key management. In this article, the author considers how to do somewhat better than that.

1. M. Bond and R. Anderson, "API-Level Attacks on Embedded Systems," Computer, vol. 34, no. 10, 2001, pp. 67–75.

Index Terms:
application layer crypto, confidentiality, object security, Internet
Citation:
Stephen Farrell, "Applications Directly Using Cryptography," IEEE Internet Computing, vol. 14, no. 3, pp. 84-87, May-June 2010, doi:10.1109/MIC.2010.62
Usage of this product signifies your acceptance of the Terms of Use.