Software-based, high performance solutions for ST MCUs including STM8, STM32 and SPC58 Chorus
Veridify Security is member of the ST Partner Program offering fast, quantum-resistant identification, authentication, and device-to-device data protection solutions ideally suited for 8-, 16- and 32-bit devices such as the STMicroelectronics STM8, STM32 and SPC58 Chorus MCUs.
Veridify's security toolkit includes Ironwood™ Key Agreement Protocol (Ironwood KAP) and Walnut Digital Signature Algorithm (WalnutDSA™), which are designed to run on the smallest processors. Based on Group Theoretic Cryptography methods, the computational efficiency of Veridify’s security protocols and algorithms translate into significant performance advantages over legacy security methods.
Regardless of which ST MCU you're building on, our methods fit and perform significantly faster than legacy methods like ECC and RSA while providing equivalent security. Of special interest to designers of devices with long service lives, all Veridify methods are quantum-resistant to all known attacks.
Automotive secure boot, authentication and data protection
For automotive design engineers, Veridify and ST offer a secure boot solution that also provides endpoint authentication and device-to-device data protection for ECUs/TCUs. The solution is software-only (no hardware accelerators required) and enables a vehicle's TCUs and ECUs to rapidly verify the authenticity and integrity of commands and sensor data.
The secure boot and firmware update signature verification operations run in under 1ms depending on processor speed, fit on low-resource ECUs and are easy to integrate with existing firmware.
Rapid development of strong security for IoT devices
The fastest way to evaluate our methods is to use a development board like the STM32 Nucleo along with our free SDK, which enables you to load our software and begin evaluating our algorithms in just minutes. You can learn more about the SDKs available and make your request for the right SDK here.
Need Help Implementing Security on Your Devices? Contact us Today!
Our security experts are ready to support you. We offer design services and free consultations.
Quickly and easily embed our fast, small-footprint, ultra-low-power cryptographic solutions in your IoT devices. Our software development tools are easily integrated into new or existing platforms.
Learn more about our partnership with ST and access valuable training resources to learn how to implement Veridify's security methods here: