Authentication and Data Protection
for the Internet of Things
We provide public-key (asymmetric) security for low-resource devices. Our ultra-low-energy, fast, and small-footprint solutions are ideally suited for 8-, 16-, and 32-bit processors.
Veridify DOME™ and Complying with US Federal IoT Cybersecurity Law from Derek Atkins, Veridify’s Chief Technology Officer
Prepare for a Post-Quantum World
If you are designing solutions that will be in the field for extended periods of time, then you need to consider the current development of quantum computers that will break popular security methods like ECC and RSA. Veridify’s public-key protocols, based on Group Theoretic Cryptography, are quantum-resistant to all known attacks.