Solutions and Toolkits for
Securing Low-Resource Devices

 

Securing small IoT devices is a difficult. Constrained devices, such as 8-, 16-, and 32-bit processors, lack the computing and memory resources needed to implement legacy security methods. The challenge is magnified by the threat quantum computing poses to classical cryptographic protocols, such as ECC and RSA. Our quantum-resistant security solutions address these issues. Our software development kits (SDK), RTL, and tools are available for a wide range of environments.

Solutions and Toolkits

Walnut Digital Signature AlgorithmTM (WalnutDSATM)

  • Ultra-fast, quantum-resistant, public-key digital signature solution for the Internet of Things
  • Typically authenticates 41× faster than ECDSA
  • Integrates with existing asymmetric and symmetric methods
  • Suitable for FPGAs, ASICs, and low-resource platforms including ARM Cortex-M and RISC-V processors

Ironwood Key Agreement ProtocolTM (Ironwood KAPTM)

  • Future-proof, Diffie-Hellman-like authentication protocol that is optimized for cost and power
  • Typically 30× or more efficient performance than ECC
  • Does not require a database or network connectivity
  • Integrates with existing asymmetric and symmetric methods
  • Suitable for FPGAs, ASICs, and low-resource platforms including ARM Cortex-M and RISC-V processors

Hickory Hash FunctionTM

  • Quantum-resistant cryptographic hash function (like SHA-2) that ensures message integrity
  • Ideal for resource-constrained implementations since it uses the same building blocks as Ironwood and WalnutDSA
  • Many-to-one function, but it is computationally infeasible to find two inputs that result in the same output
  • Reuse the underlying engine to save silicon or code space

Cryptographic Toolkits

  •  Rapidly apply authentication and data protection to your new or existing platforms. Our easy-to-implement tools provide fast, ultra-low-energy, and quantum-resistant protection for 32-, 16-, and 8-bit devices and embedded platforms. Learn More

Veridify

  • Software tools to support the development, use, and management of devices running SecureRF's security solutions.

Ready to secure your solution? Request a SecureRF IoT Embedded Security SDK. SecureRF’s engineering team, prototype lab, and cryptographers can assist you. Contact Us

Request an SDK

The IoT Embedded Security Development Kit enables you to use SecureRF’s quantum-resistant, low-resource Group Theoretic-based cryptography to provide authentication, confidentiality, and non-repudiation for your own devices.