Blowfish Algorithm


Modern embedded systems need data security more than ever before. Our PDA’s store personal e-mail and contacts lists, GPS receivers and, soon, cell phones keep logs of our movements, and our automobiles record our driving habits. Over and above all of this, users demand products that can be reprogrammed during normal use, enabling them to eliminate bugs and add new features as firmware upgrades become available. Although you may think of it as a beautiful…

Pin It