IoT Security Technology


Veridify’s asymmetric cryptographic security protocol is the world’s first linear-in-time method, which boasts a processing speed hundreds of times faster than any other commercially available IoT security method on the market today.

Our quantum-resistant cryptographic technology, based on Group Theoretic Cryptography (GTC), provides a variety of security functions such as authentication and data protection. Based on three distinct areas of mathematics (the theory of braids, the theory of matrices with polynomial entries, and modular arithmetic), the cryptosystem at its core has a specialized function known as E-Multiplication™. The combination of these mathematical tools within this specialized function delivers a strong security solution without the resource-intensive computations demanded by other methods.

Veridify’s Group Theoretic solutions address the security needs of even the smallest devices entering the IoT. Our approach enables ultra-low-power consumption and fast performance on resource-constrained systems, with an algorithm that runs in linear-time. It is suitable for 8- to 32-bit embedded processors with small memory footprints, including ARM-Cortex M0 and M3 cores, RISC-V processors, and 8-bit 8051-based microcontrollers. Protocols can be made resistant to man-in-the-middle and replay attacks, and encryption/decryption key management is mitigated because secure keys are generated for each authentication session.

Unlike classic cryptographic protocols, such as RSA and ECC, our Group Theoretic protocols are not susceptible to known quantum-based security threats. If you are designing solutions that will be in the field for extended periods of time, then you need to consider the current development of larger quantum computers that will break legacy security methods. Veridify’s cryptography is based on a quantum-resistant area of mathematics that is not subject to Shor’s algorithm because it stems from an infinite, non-abelian, non-cyclic group.

Want to learn more about GTC and asymmetric security? Refer to our papers on each subject. If you have additional questions, Veridify’s engineering team, prototype lab, and cryptographers can assist you. Contact us