SecureRF's IoT Security Blog

Articles related to IoT security and privacy solutions for NFC, RFID, embedded systems and other low-resource computing devices, keeping products smart and secure in the Internet of Things.

Cryptanalysis of the Algebraic Eraser Diffie-Hellman key agreement protocol by Ben-Zvi-Blackburn-Tsaban

Published November 17, 2015 by SecureRF in Algebraic Eraser, Authentication, Cryptography, RSA, Security

Analysis of cryptographic methods is a regular event, and it helps to identify areas requiring further research and possible improvement, weak keys or parameters, and in some very rare cases an actual weakness in a method (see SHA-1 research). We encourage reviews and analysis of our methods and make direct requests at conferences we attend throughout the year. On November 13, 2015, a group of […]


How Big is Your Key?

Published September 9, 2014 by SecureRF in Cryptography, News & Events, RSA, Security, Security Functions

In providing cryptography solutions for wireless sensors and other devices in the Internet of Things we are often asked, Can the encryption be cracked? We think this is the wrong question to ask when evaluating a cipher. Rather, we feel the question a user should ask is How long will it take to crack this encryption? You see, even if there is no known structural […]


What is Cryptography?

Published November 1, 2012 by SecureRF in Cryptography, RSA

Contributed by Joanne C. Kelleher When I was interviewing for my job at SecureRF, one of the questions I was asked was How do you learn about new technical subjects? I thought it was a strange question at the time and talked about reading, classes, online research, etc. Once I learned more about all of the technical areas and industries that SecureRF’s technology incorporates or […]


An Introduction to Cryptographic Security Methods and Their Role in Securing Low Resource Computing Devices

Published June 7, 2010 by SecureRF in Cryptography, RSA, Security

Contributed by Joanne C. Kelleher What is the difference between private key and public key cryptography? What is the difference between symmetric and asymmetric cryptography? What is the difference between Diffie-Hellman (Elliptic Curve) and RSA asymmetric cryptography methods? Since SecureRF’s Algebraic Eraser technology offers a combination of symmetric (i.e. private key or secret key) and asymmetric (i.e. public key) cryptography of the Diffie-Hellman type, we […]


Got $250? Cloning Electronic Passport Cards

Published February 4, 2009 by SecureRF in Hacks, Passport Cards, RFID, RSA, State Department

Contributed by Joanne C. Kelleher Security researcher Chris Paget has developed a way to secretly sniff and clone electronic passport cards from 30 feet away with a used RFID reader from eBay. His efforts build off the work of researchers at the University of Washington and RSA, which last year found weaknesses in US passport cards and enhanced drivers’ licenses. See No Surprise: Border-Crossing Cards […]


Cybersecurity, it’s not just for individuals any more.

Published December 11, 2008 by SecureRF in Homeland Security, Privacy, RSA, Security

Contributed by Joanne C. Kelleher We have all heard about individuals dealing with identity theft and other cybersecurity issues. Recently the topic of cybersecurity for the U.S. government and the enterprise has been in the news. 1. A new study commissioned by Lumension Security and conducted by the Ponemon Institute found that cybercrime and outsourcing were named the top security concerns for 2009. In addition […]


No Surprise: Border-Crossing Cards Can Be Copied

Published October 24, 2008 by SecureRF in Cryptography, Hacks, Homeland Security, Passport Cards, Privacy, RFID, RFID Tag, RFID Technology, RSA, Security

Contributed by Joanne C. Kelleher The Wall Street Journal posted an article called Border-Crossing Cards Can Be Copied.  It is based on a paper (EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond) and set of FAQ that have been posted on the website of RSA Laboratories, a division of EMC Corp. Researchers at the University of Washington and RSA examined […]


RFID Security: Sooner or Later

Published November 8, 2006 by SecureRF in Privacy, RFID, RFID Tag, RSA, Security

Contributed by Louis Parks: Shannon Kellogg of RSA recently posted a blog (no longer available) where he felt people in Europe and the United States are getting too worked up over the security and privacy issues around RFID. He feels it is too soon to pressure the industry to require safeguards and it is better to let RFID get off the ground and then let […]


Does SecureRF belong in the Doghouse?

Published October 16, 2006 by SecureRF in Cryptography, Privacy, RFID Technology, RSA, Security

SecureRF Corporation replies to comments in the Schneier on Security blog. http://www.schneier.com/blog/archives/2006/10/the_doghouse_se.html Not to our surprise, Bruce Schneier put SecureRF in the Doghouse in his October 9th blog. Bruce provides interesting views and opinions on his blog, often coming from brief observations or encounters with a security or privacy issue. Unfortunately he took the same brief approach here and chose to weigh-in with perhaps little […]


Will Loose Lips Sink Chips?

Published October 9, 2006 by SecureRF in Privacy, RFID, RFID Tag, RFID Technology, RSA, Security

The October 2006 issue of DC-Velocity magazine published a RFID 101 Technology Review column titled “Will loose lips sink chips?” by John R. Johnson, Executive Editor. Here is our feedback: http://www.dcvelocity.com/articles/20061001technologyreview/ We found this article to be a great overview of both the challenges and opportunities for passive RFID in item level tagging. We agree with most of Mr. Johnson’s overview of the market and […]


Search SecureRF