Securing the IoT with Group Theoretic Cryptography
Quantum-Resistant Security for the Internet of Things
SecureRF’s Group Theoretic Cryptography methods are the world’s first linear-in-time algorithm, delivers ground-breaking performance for low-power, and no-power devices. Our quantum-resistant, one-way function, based on Group Theoretic Cryptography techniques, is called E-Multiplication. It is the foundation for several cryptographic constructions including a Public Key Agreement (asymmetric) and Secret Key (symmetric) methods, a Digital Signature method, a cryptographic Hash method, a pseudo-random number generator, and even a block cipher.
It is ideally suited for securing wireless sensors, NFC and RFID tags, mobile payment devices, micro-controllers, and machine to machine (M2M) applications found in the Smart Grid and building automation markets. Our Group Theoretic Cryptography delivers up to 100 times better performance over today’s commercially available protocols – and addresses the security and privacy needs of low resource computing devices that are part of the Internet of Things (IoT). It supports a wide range of cryptographic functions including identification, authentication, and data protection:
- Authentication: Enables validation between devices to confirm identity. Message authentication codes and digital signatures can be used to ensure data integrity against modification or forging. This cryptographic function is used in anti-counterfeiting applications.
- Data Protection: Secures the entire data stream that is being carried, including the commands and information.
- Encryption and Decryption: A type of data protection that employs the process of obscuring information to make it unreadable without special knowledge. Encrypting the data, with a key management protocol, allows trusted users to read the data.
- Secured, Unencrypted Tag Data: Data on the device remains unencrypted, while a trust/policy layer maintains security, only transmitting it over a secured transport layer when in communication with cryptographically-authenticated trusted parties.
- Additional Security: Key agreement protocols, hash functions and stream ciphers.
Unlike classic cryptographic protocols such as RSA and ECC, the security of these Group Theoretic protocols is not based on any problem known to be susceptible to a quantum computing attack, which makes them viable candidates for post-quantum asymmetric cryptography.
Group Theoretic Cryptography is used in products and solutions developed by SecureRF, is available as a Security Tool Kit in several languages, as a core for FPGAs and ASICs, and in Verilog or VHDL for direct integration to an existing device. Learn more about the cryptographic methods by reading the white papers, technical presentations and patents.