Posts by Veridify Security
Lightweight Cryptography for Embedded Systems in the IoT
Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems were typically not attached to public networks, and tampering with them was arduous and required specialized software skills. The threat level against them was low to non-existent. But now that embedded systems and processors are…
Read MoreIoT Security Hacks With a Common Thread
Security of the Internet of Things (IoT) has been in the news lately, for all the wrong reasons. In addition to the recent DDoS takedown of Dyn, there were various hacking, ransomware and DDoS attacks that caught the attention of the security community. Let’s take a look at some of them: Philips Hue Hack Could…
Read MoreQuantum Computing’s Threat to Current Cryptosystems – And What We Can Do About It
The security of the digital world we live in—our banking systems, online communications, national defense infrastructure, and even everyday internet traffic—relies on cryptographic systems grounded in mathematical problems considered infeasible for classical computers to solve. Chief among these are integer factorization (used in RSA) and the discrete logarithm problem (used in Diffie-Hellman and Elliptic Curve…
Read MoreTop IoT Security Vulnerabilities
As consumers become more familiar with the Internet of Things, they’re opening their eyes to the IoT security threats that come with greater connectivity. And many of the threats that they fear the most are also on the radars of industry professionals. Consumers, according to a recent survey by Vormetric, fear hacking attacks on cars…
Read MoreMessage to Products in the IoT: An Ounce of Prevention is Worth a Pound of Cure
With the record breaking year of data breaches in 2015, it’s safe to say that many businesses have developed an adequate understanding of the vital need for cybersecurity on products or devices. Then why are so many businesses still only focusing on making their products smart but not secure? Why is technology for IoT security…
Read MoreSecuring the IoS – the Internet of Sensors
The Internet of Things is talking loud and clear and nearly anyone can listen. Sensors are on almost everything from cars, refrigerators and wearables, to a town’s streetlights, water supply systems and air quality tracking devices. People’s lives are made easier and more efficient with the delivery of helpful data and information in seconds. The…
Read MoreHow Big is Your Key?
In providing cryptography solutions for wireless sensors and other devices in the Internet of Things we are often asked, Can the encryption be cracked? We think this is the wrong question to ask when evaluating a cipher. Rather, we feel the question a user should ask is How long will it take to crack this…
Read MoreSecurity Is Not Just Encrypting Data
When I meet people and they ask me what my company does, the dialogue in 2010 often used to go like this: Them: What do you do? Me: My company provides security solutions for wireless sensors and RFID. Them: Oh, so you encrypt data. If I was running to catch a train, a benefit of…
Read MorePrivacy versus Security
If you have been affiliated with Automated Identification Technology (AIT), Machine to Machine (M2M) communications or the Internet of Things (IoT) in any way, you are probably very familiar with the worldwide concerns that have been raised around privacy and security. In fact, we often think of privacy and security as a single issue and…
Read MoreWhat is Cryptography?
Cryptography and Encryption Cryptography is the science of securing information and communications by transforming data into a coded format, ensuring that only authorized parties can access and understand it. At its core, cryptography uses mathematical algorithms and keys to convert plaintext (readable data) into ciphertext (an unreadable, encrypted form), a process known as encryption. Decryption…
Read More