Quantum Computing’s Threat to Current Cryptosystems

The computers and communication systems we use today rely on cryptographic systems commonly based on factoring large numbers or finding discrete logarithms. Both these methods are secure because conventional computers lack the sheer computational power needed to break them. For example, a recent factoring for RSA with a long key was RSA-220 (220 decimal digits,…
Read More

Top IoT Security Vulnerabilities

As consumers become more familiar with the Internet of Things, they’re opening their eyes to the IoT security threats that come with greater connectivity. And many of the threats that they fear the most are also on the radars of industry professionals. Consumers, according to a recent survey by Vormetric, fear hacking attacks on cars…
Read More

Message to Products in the IoT: An Ounce of Prevention is Worth a Pound of Cure

With the record breaking year of data breaches in 2015, it’s safe to say that many businesses have developed an adequate understanding of the vital need for cybersecurity on products or devices. Then why are so many businesses still only focusing on making their products smart but not secure? Why is technology for IoT security…
Read More

Securing the IoS – the Internet of Sensors

The Internet of Things is talking loud and clear and nearly anyone can listen. Sensors are on almost everything from cars, refrigerators and wearables, to a town’s streetlights, water supply systems and air quality tracking devices. People’s lives are made easier and more efficient with the delivery of helpful data and information in seconds. The…
Read More

SecureRF Collaborates with University at Buffalo Mathematics Doctoral Students to Study Algebraic Eraser

SecureRF, a leading provider of security solutions for the Internet of Things, announces their participation in an innovative research program for math Ph.D. candidates with the University at Buffalo. This collaboration is supported by a $600,000 grant from the National Science Foundation and will provide the candidates with an opportunity to apply their knowledge to…
Read More

How Big is Your Key?

In providing cryptography solutions for wireless sensors and other devices in the Internet of Things we are often asked, Can the encryption be cracked? We think this is the wrong question to ask when evaluating a cipher. Rather, we feel the question a user should ask is How long will it take to crack this…
Read More

Security Is Not Just Encrypting Data

When I meet people and they ask me what my company does, the dialogue in 2010 often used to go like this: Them: What do you do? Me: My company provides security solutions for wireless sensors and RFID. Them: Oh, so you encrypt data. If I was running to catch a train, a benefit of…
Read More

Privacy versus Security

If you have been affiliated with Automated Identification Technology (AIT), Machine to Machine (M2M) communications or the Internet of Things (IoT) in any way, you are probably very familiar with the worldwide concerns that have been raised around privacy and security. In fact, we often think of privacy and security as a single issue and…
Read More
What is Cryptography?

What is Cryptography?

Cryptography and Encryption Cryptography is the science of securing information and communications by transforming data into a coded format, ensuring that only authorized parties can access and understand it. At its core, cryptography uses mathematical algorithms and keys to convert plaintext (readable data) into ciphertext (an unreadable, encrypted form), a process known as encryption. Decryption…
Read More

An Introduction to Cryptographic Security Methods and Their Role in Securing Low Resource Computing Devices

Contributed by Joanne C. Kelleher What is the difference between private key and public key cryptography? What is the difference between symmetric and asymmetric cryptography? What is the difference between Diffie-Hellman (Elliptic Curve) and RSA asymmetric cryptography methods? Since SecureRF’s Algebraic Eraser technology offers a combination of symmetric (i.e. private key or secret key) and…
Read More

Archives