Security Functions
NIST Accepts SecureRF’s WalnutDSA for Evaluation
SecureRF’s Walnut Digital Signature Algorithm (WalnutDSA) has been accepted by the National Institute of Standards and Technology (NIST) for evaluation as a standard for post-quantum, public-key cryptography. NIST expects to perform multiple rounds of evaluation over a period of three to five years on all of the methods submitted. WalnutDSA is a fast, easy-to-implement, low-energy solution…
Read MoreNew Paper: Kayawood Key Agreement Protocol
SecureRF has published a new paper, “Kayawood, a Key Agreement Protocol,” which introduces a group-theoretic key agreement protocol that leverages the known NP-Hard shortest word problem (among others) to provide an Elgamal-style, Diffie-Hellman-like method. The paper also discusses the implementation of and behavioral aspects of Kayawood, introduces new methods to obfuscate braids using Stochastic Rewriting, and…
Read MoreAsk SecureRF: AES for Authentication?
Question: AES is used successfully all the time. Why shouldn’t we use AES for authentication? SecureRF: AES is a range of symmetric encryption mechanisms widely available on many devices—for free. You can use AES to authenticate a device, but it typically requires the connection to a database or network and lot of other processing that…
Read MoreSecureRF CEO discusses security, IoT, SBIR and hockey in CTStartup Podcast
Our CEO, Louis Parks, was interviewed for a podcast by CTStartup. This was recorded at the CT Innovation Summit which was put on by the Connecticut Technology Council. Their discussion starts with some explanations about security, which Louis clarifies is more than just encryption and can include authentication and non-repudiation. They discuss various IoT hacking…
Read MoreSecureRF to Partner with University of Buffalo under NSF Grant
The National Science Foundation has awarded the University at Buffalo mathematics department a three-year, $600,000 grant to support the new program Experiential Diversity in Graduate Education (EDGE@UB). Led by mathematics professor and director of graduate studies William Menasco, the initiative is a collaboration with industry and academic partners including IBM’s Buffalo Innovation Center, M&T Bank,…
Read MoreSecureRF Discussing Security for IoT Devices at Three Events in Early October 2015
The Internet of Things (IoT) is a hot topic right now and one of the largest concerns is around security. SecureRF will discuss how we are securing the Internet of Things at three different types of events in early October: a semiconductor’s forum on security, a trade association summit and an academic workshop on cryptography.…
Read MoreAlgebraic Eraser presentations to CRYPTO Conference and NIST Lightweight Cryptography Workshop
SecureRF gave two technical presentations about the Algebraic Eraser this summer. On August 18, 2015 at the Rump session of CRYPTO 2015, the 35th International Cryptology Conference, Derek Atkins presented “A Lightweight, Highly Performant Public Key Exchange.” View the slides. On July 20-21, 2015 at the NIST Lightweight Cryptography Workshop, Derek Atkins and Paul E.…
Read MoreHow Big is Your Key?
In providing cryptography solutions for wireless sensors and other devices in the Internet of Things we are often asked, Can the encryption be cracked? We think this is the wrong question to ask when evaluating a cipher. Rather, we feel the question a user should ask is How long will it take to crack this…
Read MoreSecurity Is Not Just Encrypting Data
When I meet people and they ask me what my company does, the dialogue in 2010 often used to go like this: Them: What do you do? Me: My company provides security solutions for wireless sensors and RFID. Them: Oh, so you encrypt data. If I was running to catch a train, a benefit of…
Read MorePrivacy versus Security
If you have been affiliated with Automated Identification Technology (AIT), Machine to Machine (M2M) communications or the Internet of Things (IoT) in any way, you are probably very familiar with the worldwide concerns that have been raised around privacy and security. In fact, we often think of privacy and security as a single issue and…
Read More