IoT Security Blog

Articles and Posts on IoT Security, Embedded Systems, and the Internet of Things

Security Functions

Ask SecureRF: AES for Authentication?

Question: AES is used successfully all the time. Why shouldn’t we use AES for authentication? SecureRF: AES is a range of symmetric encryption mechanisms widely available on many devices—for free. You can use AES to authenticate a device, but it typically requires the connection to a database or network and lot of other processing that…

Read More

SecureRF CEO discusses security, IoT, SBIR and hockey in CTStartup Podcast

Our CEO, Louis Parks, was interviewed for a podcast by CTStartup. This was recorded at the CT Innovation Summit which was put on by the Connecticut Technology Council. Their discussion starts with some explanations about security, which Louis clarifies is more than just encryption and can include authentication and non-repudiation. They discuss various IoT hacking…

Read More

SecureRF to Partner with University of Buffalo under NSF Grant

The National Science Foundation has awarded the University at Buffalo mathematics department a three-year, $600,000 grant to support the new program Experiential Diversity in Graduate Education (EDGE@UB). Led by mathematics professor and director of graduate studies William Menasco, the initiative is a collaboration with industry and academic partners including IBM’s Buffalo Innovation Center, M&T Bank,…

Read More

Algebraic Eraser presentations to CRYPTO Conference and NIST Lightweight Cryptography Workshop

SecureRF gave two technical presentations about the Algebraic Eraser this summer. On August 18, 2015 at the Rump session of CRYPTO 2015, the 35th International Cryptology Conference, Derek Atkins presented “A Lightweight, Highly Performant Public Key Exchange.” View the slides. On July 20-21, 2015 at the NIST Lightweight Cryptography Workshop, Derek Atkins and Paul E.…

Read More

How Big is Your Key?

In providing cryptography solutions for wireless sensors and other devices in the Internet of Things we are often asked, Can the encryption be cracked? We think this is the wrong question to ask when evaluating a cipher. Rather, we feel the question a user should ask is How long will it take to crack this…

Read More

Security Is Not Just Encrypting Data

When I meet people and they ask me what my company does, the dialogue in 2010 often used to go like this: Them: What do you do? Me: My company provides security solutions for wireless sensors and RFID. Them: Oh, so you encrypt data. If I was running to catch a train, a benefit of…

Read More

Privacy versus Security

If you have been affiliated with Automated Identification Technology (AIT), Machine to Machine (M2M) communications or the Internet of Things (IoT) in any way, you are probably very familiar with the worldwide concerns that have been raised around privacy and security. In fact, we often think of privacy and security as a single issue and…

Read More