Posts by Joanne Kelleher

Challenges of Cryptography for Low-energy Devices in the IoT

Many Internet of Things (IoT) devices have constraints on the amount of energy available to them. Examples include wireless sensors, RFID tags, NFC tags, smart cards and machine-to-machine (M2M) microcontrollers. Like most other connected devices, they need to be secured by cryptography that provides fast identification, authentication and data protection. However, while their low-energy usage…

Read More

Webinar Replay Available: Jumpstart your IoT Security Project

Devices driven by 8- or 16-bit processors don’t have the compute and memory resources to incorporate ECC security with acceptable runtimes and resource allocation, but many still require authentication and/or data protection. As IoT and IIoT adoption grows and customer concerns about security issues increase, so does the need for a solution. Watch our webinar…

Read More

Cryptographic Security for Keyless Car Entry Systems – Not Gone in 60 Seconds

Recent news reports from sources including Insurance Journal, the National Insurance Crime Bureau and the TODAY Show have highlighted a critical security weakness in some cars and trucks equipped with keyless remotes and pushbutton ignitions. As demonstrated in the following TODAY Show video, thieves are using small, handheld devices that wirelessly replicate the signal of…

Read More

Lightweight Cryptography for Embedded Systems in the IoT

Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems were typically not attached to public networks, and tampering with them was arduous and required specialized software skills. The threat level against them was low to non-existent. But now that embedded systems and processors are…

Read More

Quantum Computing’s Threat to Current Cryptosystems

The computers and communication systems we use today rely on cryptographic systems commonly based on factoring large numbers or finding discrete logarithms. Both these methods are secure because conventional computers lack the sheer computational power needed to break them. For example, a recent factoring for RSA with a long key was RSA-220 (220 decimal digits,…

Read More

SecureRF Collaborates with University at Buffalo Mathematics Doctoral Students to Study Algebraic Eraser

SecureRF, a leading provider of security solutions for the Internet of Things, announces their participation in an innovative research program for math Ph.D. candidates with the University at Buffalo. This collaboration is supported by a $600,000 grant from the National Science Foundation and will provide the candidates with an opportunity to apply their knowledge to…

Read More