Skip to main content

Porting a Network Cryptographic Service to the RMC2000

A Case Study in Embedded Software Development

  • Chapter
  • 375 Accesses

Abstract

This chapter describes our experience porting a transport-layer cryptography service to an embedded microcontroller. We describe some key development issues and techniques involved in porting networked software to a connected, limited resource device such as the Rabbit RMC2000 we chose for this case study. We examine the effectiveness of a few proposed porting strategies by examining important program and run-time characteristics.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   189.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Barr. Programming Embedded Systems in C and C++. O Reilly & Associates, Inc., Sebastopol, California, 1999.

    Google Scholar 

  2. P. J. Brown. “Levels of Language for Portable Software.” Communications of the ACM, Vol. 15, No. 12, pp. 1059–1062, December 1972.

    Article  Google Scholar 

  3. J. Daemen and V. Rijmen. “The Block Cipher Rijndael.” In Proceedings of the Third Smart Card Research and Advanced Applications Conference, 1998.

    Google Scholar 

  4. M. de Champlain. “Patterns to Ease the Port of Micro-Kernels in Embedded Systems.” In Proceedings of the 3rd Annual Conference on Pattern Languages of Programs (PLoP 96), Allterton Park, Illinois, June 1996.

    Google Scholar 

  5. T. Dierks and C. Allen. The TLS Protocol. Internet draft, Transport Layer Security Working Group, May 1997.

    Google Scholar 

  6. A. O. Freier, P. Karlton, and P. C. Kocher. The SSL Protocol. Internet draft, Transport Layer Security Working Group, Nov. 1996.

    Google Scholar 

  7. J. Gassle. “Dumb Mistakes.” The Embedded Muse Newsletter, August 7, 1997.

    Google Scholar 

  8. J. G. Gassle. The Art of Programming Embedded Systems. Academic Press, 1992.

    Google Scholar 

  9. A. Gokhale and D. C. Schmidt. “Techniques for Optimizing CORBA Middleware for Distributed Embedded Systems.” In Proceedings of INFOCOM 99, March 1999.

    Google Scholar 

  10. A. Goldberg, R. Buff, and A. Schmitt. “Secure Web Server Performance Using SSL Session Keys.” In Workshop on Internet Server Performance, held in conjunction with SIGMETRICS 98, June 1998.

    Google Scholar 

  11. D. R. Hanson. C Interfaces and Implementations-Techniques for Creating Reusable Software. Addison-Wesley, Reading, Massachussets, 1997.

    Google Scholar 

  12. B. W. Kernighan and D. M. Ritchie. The C Programming Langage. Prentice Hall, Englewood Cliffs, New Jersey, second edition, 1988.

    Google Scholar 

  13. J. Labrosse. MicroC/OS-II. CMP Books, Lawrence, Kansas, 1998.

    Google Scholar 

  14. R. Leupers. Code Optimization Techniques for Embedded Processors: Methods, Algorithms, and Tools. Kluwer Academic Publishers, 2000.

    Google Scholar 

  15. B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson. “Performance Comparison of the AES Submissions.” In Proceedings of the Second AES Candidate Conference, pp. 15–34, NIST, March 1999.

    Google Scholar 

  16. S. Vinoski. “CORBA: Integrating Diverse Applications Within Distributed Heterogeneous Environments.” IEEE Communications Magazine, Vol. 14, No. 2, February 1997.

    Google Scholar 

  17. C. Yang. “Performance Evaluation of AES/DES/Camellia on the 6805 and H8/300 CPUs.” In Proceedings of the 2001 Symposium on Cryptography and Information Security, pp. 727–730, Oiso, Japan, January 2001.

    Google Scholar 

  18. V. Zivojnovic, C. Schlager, and H. Meyr. “DSPStone: A DSP-oriented Benchmarking Methodology.” In International Conference on Signal Processing, 1995.

    Google Scholar 

  19. K. Zurell. C Programming for Embedded Systems. CMP Books, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Kluwer Academic Publishers

About this chapter

Cite this chapter

Jan, S., de Dios, P., Edwards, S.A. (2003). Porting a Network Cryptographic Service to the RMC2000. In: Jerraya, A.A., Yoo, S., Verkest, D., Wehn, N. (eds) Embedded Software for SoC. Springer, Boston, MA. https://doi.org/10.1007/0-306-48709-8_13

Download citation

  • DOI: https://doi.org/10.1007/0-306-48709-8_13

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-7528-5

  • Online ISBN: 978-0-306-48709-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics