Cryptography
SecureRF Collaborates with University at Buffalo Mathematics Doctoral Students to Study Algebraic Eraser
SecureRF, a leading provider of security solutions for the Internet of Things, announces their participation in an innovative research program for math Ph.D. candidates with the University at Buffalo. This collaboration is supported by a $600,000 grant from the National Science Foundation and will provide the candidates with an opportunity to apply their knowledge to…
Read MoreHow Big is Your Key?
In providing cryptography solutions for wireless sensors and other devices in the Internet of Things we are often asked, Can the encryption be cracked? We think this is the wrong question to ask when evaluating a cipher. Rather, we feel the question a user should ask is How long will it take to crack this…
Read MorePrivacy versus Security
If you have been affiliated with Automated Identification Technology (AIT), Machine to Machine (M2M) communications or the Internet of Things (IoT) in any way, you are probably very familiar with the worldwide concerns that have been raised around privacy and security. In fact, we often think of privacy and security as a single issue and…
Read MoreWhat is Cryptography?
Cryptography and Encryption Cryptography is the science of securing information and communications by transforming data into a coded format, ensuring that only authorized parties can access and understand it. At its core, cryptography uses mathematical algorithms and keys to convert plaintext (readable data) into ciphertext (an unreadable, encrypted form), a process known as encryption. Decryption…
Read MoreAn Introduction to Cryptographic Security Methods and Their Role in Securing Low Resource Computing Devices
Contributed by Joanne C. Kelleher What is the difference between private key and public key cryptography? What is the difference between symmetric and asymmetric cryptography? What is the difference between Diffie-Hellman (Elliptic Curve) and RSA asymmetric cryptography methods? Since SecureRF’s Algebraic Eraser technology offers a combination of symmetric (i.e. private key or secret key) and…
Read More