Cryptography

New Paper: Kayawood Key Agreement Protocol

SecureRF has published a new paper, “Kayawood, a Key Agreement Protocol,” which introduces a group-theoretic key agreement protocol that leverages the known NP-Hard shortest word problem (among others) to provide an Elgamal-style, Diffie-Hellman-like method. The paper also discusses the implementation of and behavioral aspects of Kayawood, introduces new methods to obfuscate braids using Stochastic Rewriting, and…

Read More

Women in Tech: Iris Anshel (Chief Scientist, SecureRF)

Iris Anshel, Chief Scientist at SecureRF, is featured in EE Times’s “Women in Tech: 25 Profiles in Persistence.” She was interviewed along with 24 other women in tech—including scientists, engineers, and executives—from companies such as Qualcomm, STMicroelectronics, and Texas Instruments. In the interview, Anshel talks about using her background in combinatorial group theory to develop cryptographic primitives and protocols…

Read More

SecureRF Profiled at StaceyOnIoT.com

SecureRF and its CEO Louis Parks were recently profiled by Stacey Higginbotham in the weekly IoT-based Stacey Knows Things newsletter and at StaceyOnIoT.com. Parks described some of the various challenges associated with securing the IoT, and he talked to Higginbotham about SecureRF’s cryptography solutions for low-resource devices, such as 8- and 16-bit microcontrollers.

Read More

Imminent Arrival of Quantum Computers Spells Danger for Private Data

In a previous blog post, we reported that quantum computers might be available in the next ten to fifteen years. However, with companies including Google and IBM significantly ramping up their efforts to make quantum computing a reality, it is likely that commercial availability of quantum computers will arrive ahead of schedule. A recent article…

Read More

Sensor Security in Manufacturing and Construction IoT Applications

Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. Much of the equipment used in these industries comes with built-in devices for sensing, data collection and communicating. The data flowing through these devices helps both industries meet a number of requirements including efficiency, safety,…

Read More

Webinar Replay Available: Quantum-resistant Cryptography for the IoT

Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved in the production of low-resource IoT devices driven by 32-, 16- and even 8-bit processors are not able to implement contemporary security solutions with acceptable runtime and resource allocation. This on-demand webinar is a special opportunity…

Read More

Cryptography Basic for Chip Design Engineers

The purpose of cryptography is to assure data protection, authentication, and non-repudiation (so no one can deny they took part in a communication). While codes and encryption have existed in one form or another since ancient times, it’s thanks to advances in electronic cryptographic systems since the 1970s that today we enjoy things like secure…

Read More

Lightweight Cryptography for Embedded Systems in the IoT

Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems were typically not attached to public networks, and tampering with them was arduous and required specialized software skills. The threat level against them was low to non-existent. But now that embedded systems and processors are…

Read More

Quantum Computing’s Threat to Current Cryptosystems – And What We Can Do About It

The security of the digital world we live in—our banking systems, online communications, national defense infrastructure, and even everyday internet traffic—relies on cryptographic systems grounded in mathematical problems considered infeasible for classical computers to solve. Chief among these are integer factorization (used in RSA) and the discrete logarithm problem (used in Diffie-Hellman and Elliptic Curve…

Read More

SecureRF Collaborates with University at Buffalo Mathematics Doctoral Students to Study Algebraic Eraser

SecureRF, a leading provider of security solutions for the Internet of Things, announces their participation in an innovative research program for math Ph.D. candidates with the University at Buffalo. This collaboration is supported by a $600,000 grant from the National Science Foundation and will provide the candidates with an opportunity to apply their knowledge to…

Read More