Posts Tagged ‘Cryptography’
Evaluate Us Your Way: Free SecureRF Security SDKs Available on the Platform of Your Choice
We provide software development kits (SDKs) for a multitude of processors, microcontrollers (MCUs) and development boards so you can evaluate SecureRF’s cryptographic methods on the platform of your choice. Our SDKs contain our libraries compiled for your target processor, along with example source code in C, sample keys, certificates, and digital signatures. SDKs created for…
Read MoreWho is Responsible for Securing the IoT?
We all love progress, especially when it comes to our gadgets. Everything from thermostats to grilling equipment is now potentially connected, opening a broad range of functions and opportunities for convenience and pleasure. A big reason for the increased functionality we enjoy today is the broad ecosystem that has evolved to connect everything to everyone…
Read MoreUse of IoT Devices as a ‘Fly on the Wall’ During Trump and Putin Meeting–Why We Should Care and What We Should Do
There is something about a closed-door meeting that seems to spark everyone’s curiosity. We cannot help but wonder who might be the subject of conversation or what is so secretive. So, when two heads of state meet privately sans their usual entourage, as the leaders of the United States and Russia did recently in Helsinki,…
Read MoreMeet 20 of the Most Powerful Women in Technology
Dr. Iris Anshel, Chief Scientist at SecureRF, has been included in a select list of 20 of the most influential women in technology as reported by Yolande D’Mello in her article for AiThority. Dr. Anshel earned a Ph.D. in math from Columbia, co-developed the foundational group theoretic methods that underlie all SecureRF protocols, and has…
Read MoreNIST Post-Quantum Cryptography Standardization Project and SecureRF
Quantum computing is moving from theory to reality. MIT and commercial entities including IBM, Microsoft, and Google have already delivered elementary quantum computing platforms. When large-enough quantum computers are built, known algorithms will be able to weaken or break most of the public-key methods now in use. Concerns over the security threat this represents are…
Read MoreWomen in Tech: Iris Anshel (Chief Scientist, SecureRF)
Iris Anshel, Chief Scientist at SecureRF, is featured in EE Times’s “Women in Tech: 25 Profiles in Persistence.” She was interviewed along with 24 other women in tech—including scientists, engineers, and executives—from companies such as Qualcomm, STMicroelectronics, and Texas Instruments. In the interview, Anshel talks about using her background in combinatorial group theory to develop cryptographic primitives and protocols…
Read MoreThe Value of Data Protection in the Internet of Things
The IoT is made up of billions of devices that collect and share data. If this data is not properly secured, it puts both end-users and manufacturers at risk for all sorts of disastrous consequences. For example, the data collected by a smart thermostat can reveal when someone is home based on their heating and…
Read MoreImminent Arrival of Quantum Computers Spells Danger for Private Data
In a blog post we published last November, we reported that quantum computers might be available in the next ten to fifteen years. However, with companies including Google and IBM significantly ramping up their efforts to make quantum computing a reality, it is likely that commercial availability for these “super computers” will arrive ahead of…
Read MoreThe Biggest IoT Security Threat: Failure of Imagination
IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies are deploying IoT sensors and devices, many of which are not properly secured. In fact, analysts with Forrester and Strategic Cyber Ventures go so far as to predict widespread and large-scale security breaches. We believe…
Read MoreSensor Security in Manufacturing and Construction IoT Applications
Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. Much of the equipment used in these industries comes with built-in devices for sensing, data collection and communicating. The data flowing through these devices helps both industries meet a number of requirements including efficiency, safety,…
Read More