Posts Tagged ‘Cryptography’
Webinar Replay Available: Quantum-resistant Cryptography for the IoT
Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved in the production of low-resource IoT devices driven by 32-, 16- and even 8-bit processors are not able to implement contemporary security solutions with acceptable runtime and resource allocation. This on-demand webinar is a special opportunity…
Read MoreRegister for our February 9 Webinar: Rapidly Securing Constrained IoT Devices
3rd webinar in our series: How to add authentication and data protection to your IoT devices in two days or less The rush to deploy connected devices such as industrial sensors, consumer electronics, vehicles, medical devices and wearables creates significant opportunities for manufacturers. However, many companies are risking brand damage, revenue loss and more by…
Read MoreChallenges of Cryptography for Low-energy Devices in the IoT
Many Internet of Things (IoT) devices have constraints on the amount of energy available to them. Examples include wireless sensors, RFID tags, NFC tags, smart cards and machine-to-machine (M2M) microcontrollers. Like most other connected devices, they need to be secured by cryptography that provides fast identification, authentication and data protection. However, while their low-energy usage…
Read MoreCryptography Basic for Chip Design Engineers
The purpose of cryptography is to assure data protection, authentication, and non-repudiation (so no one can deny they took part in a communication). While codes and encryption have existed in one form or another since ancient times, it’s thanks to advances in electronic cryptographic systems since the 1970s that today we enjoy things like secure…
Read MoreLightweight Cryptography for Embedded Systems in the IoT
Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems were typically not attached to public networks, and tampering with them was arduous and required specialized software skills. The threat level against them was low to non-existent. But now that embedded systems and processors are…
Read MoreQuantum Computing’s Threat to Current Cryptosystems
The computers and communication systems we use today rely on cryptographic systems commonly based on factoring large numbers or finding discrete logarithms. Both these methods are secure because conventional computers lack the sheer computational power needed to break them. For example, a recent factoring for RSA with a long key was RSA-220 (220 decimal digits,…
Read MoreTop IoT Security Vulnerabilities
As consumers become more familiar with the Internet of Things, they’re opening their eyes to the IoT security threats that come with greater connectivity. And many of the threats that they fear the most are also on the radars of industry professionals. Consumers, according to a recent survey by Vormetric, fear hacking attacks on cars…
Read MoreSecureRF Collaborates with University at Buffalo Mathematics Doctoral Students to Study Algebraic Eraser
SecureRF, a leading provider of security solutions for the Internet of Things, announces their participation in an innovative research program for math Ph.D. candidates with the University at Buffalo. This collaboration is supported by a $600,000 grant from the National Science Foundation and will provide the candidates with an opportunity to apply their knowledge to…
Read MoreHow Big is Your Key?
In providing cryptography solutions for wireless sensors and other devices in the Internet of Things we are often asked, Can the encryption be cracked? We think this is the wrong question to ask when evaluating a cipher. Rather, we feel the question a user should ask is How long will it take to crack this…
Read MorePrivacy versus Security
If you have been affiliated with Automated Identification Technology (AIT), Machine to Machine (M2M) communications or the Internet of Things (IoT) in any way, you are probably very familiar with the worldwide concerns that have been raised around privacy and security. In fact, we often think of privacy and security as a single issue and…
Read More