Security Functions

NIST Accepts SecureRF’s WalnutDSA for Evaluation

SecureRF’s Walnut Digital Signature Algorithm (WalnutDSA) has been accepted by the National Institute of Standards and Technology (NIST) for evaluation as a standard for post-quantum, public-key cryptography. NIST expects to perform multiple rounds of evaluation over a period of three to five years on all of the methods submitted. WalnutDSA is a fast, easy-to-implement, low-energy solution…

Read More

New Paper: Kayawood Key Agreement Protocol

SecureRF has published a new paper, “Kayawood, a Key Agreement Protocol,” which introduces a group-theoretic key agreement protocol that leverages the known NP-Hard shortest word problem (among others) to provide an Elgamal-style, Diffie-Hellman-like method. The paper also discusses the implementation of and behavioral aspects of Kayawood, introduces new methods to obfuscate braids using Stochastic Rewriting, and…

Read More

Ask SecureRF: AES for Authentication?

Question: AES is used successfully all the time. Why shouldn’t we use AES for authentication? SecureRF: AES is a range of symmetric encryption mechanisms widely available on many devices—for free. You can use AES to authenticate a device, but it typically requires the connection to a database or network and lot of other processing that…

Read More

How Big is Your Key?

In providing cryptography solutions for wireless sensors and other devices in the Internet of Things we are often asked, Can the encryption be cracked? We think this is the wrong question to ask when evaluating a cipher. Rather, we feel the question a user should ask is How long will it take to crack this…

Read More

Security Is Not Just Encrypting Data

When I meet people and they ask me what my company does, the dialogue in 2010 often used to go like this: Them: What do you do? Me: My company provides security solutions for wireless sensors and RFID. Them: Oh, so you encrypt data. If I was running to catch a train, a benefit of…

Read More

Privacy versus Security

If you have been affiliated with Automated Identification Technology (AIT), Machine to Machine (M2M) communications or the Internet of Things (IoT) in any way, you are probably very familiar with the worldwide concerns that have been raised around privacy and security. In fact, we often think of privacy and security as a single issue and…

Read More