I. Introduction
Nowadays, distributed embedded real-time systems are facing increasing security problems. More and more of these systems are connected to internet, which increases the possibility of security attacks. For distributed systems, there are megabytes of data transferred through insecure network. Some of them are quite sensitive and disclosure of them may produce huge damage. In particular, in the business world and the government, where data is considered sensitive, the potential data losses due to a security incident could be catastrophic [1]. In order to prevent unauthorized access to the information and guarantee security of them, cryptography is surely adopted.