IoT Security Blog

Articles and Posts on IoT Security, Embedded Systems, and the Internet of Things

Cryptography

Women in Tech: Iris Anshel (Chief Scientist, SecureRF)

Iris Anshel, Chief Scientist at SecureRF, is featured in EE Times’s “Women in Tech: 25 Profiles in Persistence.” She was interviewed along with 24 other women in tech—including scientists, engineers, and executives—from companies such as Qualcomm, STMicroelectronics, and Texas Instruments. In the interview, Anshel talks about using her background in combinatorial group theory to develop cryptographic primitives and protocols…

Read More

Louis Parks Interviewed at ARM TechCon About IoT Security

Internet of Things (IoT) security was a hot topic at ARM TechCon 2017. Louis Parks, CEO of SecureRF, talked with EDACafe.com about IoT security challenges and SecureRF’s quantum-resistant, public-key security solutions for small devices such as ARM Cortex-M series processors. The complete interview is now available. SecurRF’s future-proof, ultra-low-energy security tools enable developers to quickly add authentication…

Read More

SecureRF Profiled at StaceyOnIoT.com

SecureRF and its CEO Louis Parks were recently profiled by Stacey Higginbotham in the weekly IoT-based Stacey Knows Things newsletter and at StaceyOnIoT.com. Parks described some of the various challenges associated with securing the IoT, and he talked to Higginbotham about SecureRF’s cryptography solutions for low-resource devices, such as 8- and 16-bit microcontrollers.

Read More

Imminent Arrival of Quantum Computers Spells Danger for Private Data

In a blog post we published last November, we reported that quantum computers might be available in the next ten to fifteen years. However, with companies including Google and IBM significantly ramping up their efforts to make quantum computing a reality, it is likely that commercial availability for these “super computers” will arrive ahead of…

Read More

Sensor Security in Manufacturing and Construction IoT Applications

Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. Much of the equipment used in these industries comes with built-in devices for sensing, data collection and communicating. The data flowing through these devices helps both industries meet a number of requirements including efficiency, safety,…

Read More

Webinar Replay Available: Quantum-resistant Cryptography for the IoT

Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved in the production of low-resource IoT devices driven by 32-, 16- and even 8-bit processors are not able to implement contemporary security solutions with acceptable runtime and resource allocation. This on-demand webinar is a special opportunity…

Read More

Basics of Cryptography for Chip Design Engineers

The purpose of cryptography is to assure data protection, authentication, and non-repudiation (so no one can deny they took part in a communication). While codes and encryption have existed in one form or another since ancient times, it’s thanks to advances in electronic cryptographic systems since the 1970s that today we enjoy things like secure…

Read More

SecureRF CTO Presents WalnutDSA Asymmetric Signature Scheme at NIST Lightweight Cryptography Workshop 2016

In a presentation at the NIST Lightweight Cryptographic Workshop 2016, Derek Atkins, SecureRF’s Chief Technology Officer, introduced the audience to WalnutDSA, our lightweight, public-key signature scheme for use in low-resource IoT devices. WalnutDSA’s major benefits, Atkins explained, include its quantum resistance and its rapid signature verification, especially in comparison with ECDSA. Atkins took the audience…

Read More

Lightweight Cryptography for Embedded Systems in the IoT

Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems were typically not attached to public networks, and tampering with them was arduous and required specialized software skills. The threat level against them was low to non-existent. But now that embedded systems and processors are…

Read More

Quantum Computing's Threat to Current Cryptosystems

The computers and communication systems we use today rely on cryptographic systems commonly based on factoring large numbers or finding discrete logarithms. Both these methods are secure because conventional computers lack the sheer computational power needed to break them. For example, a recent factoring for RSA with a long key was RSA-220 (220 decimal digits,…

Read More