%0 Journal Article %T Security Processing for High End Embedded System with Cryptographic Algorithms %A M.Shankar %A Dr.M.Sridar %A Dr.M.Rajani %J International Journal of Computer Science and Management Studies %D 2012 %I Imperial Foundation %X This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm thecomputational capabilities of processors in both low- and highendembedded systems. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device. We also survey solution techniques to address these challenges, drawing from both current practice and emerging esearch, and identify open research problems that will require innovations in embedded system architecture and design methodologies. %K Security %K Performance %K Design %K Reliability %U http://www.ijcsms.com/journals/Volume%2012,%20Issue%2001,%20January%202012_Shankar111.pdf