In the previous blog post, “Embedded Security Using Cryptography”, we looked at how cryptography can be used for securing ...