Security
Veridify DOME™ and Complying with US Federal IoT Cybersecurity Law
In December 2020, as the 116th Session neared its end, Congress passed H.R. 1668, the Internet of Things Cybersecurity Improvement Act of 2020, and the President signed it into law, Public Law 106-207 [Law]. The act’s primary objective is to establish minimum security standards for IoT devices owned or controlled by the Federal Government. It…
Read MoreSecureRF Provides Security Solutions as Part of SiFive’s Expanded DesignShare IP Ecosystem
We are pleased to be a DesignShare ecosystem member collaborating with SiFive to enable cryptographic security solutions for differentiated RISC-V based SoC’s. SiFive’s DesignShare ecosystem addresses offers a complete portfolio of leading and differentiating IP for custom SoC and Template SoC development, optimized for AI, IoT and edge inference. Learn more about SecureRF’s IoT Security…
Read MoreIoT Security News: Attacks, Encryption and WAP3
The new year kicked off with major security-related news. On January 3, we learned that billions of CPUs are vulnerable to the Meltdown and Spectre side-channel attacks, which can be used to access sensitive data, including passwords, cryptography keys, and files. Since then, chip makers and cloud service providers have been scrambling to develop and…
Read MoreAn Update on Spectre and Meltdown
Computer owners, beware! In early January, we learned about two massive security flaws in most of the CPUs used in computers built during the past two decades. Attackers can use the flaws, named Spectre and Meltdown, to access sensitive data stored in a computer chip, including passwords and files. During the past several weeks, the…
Read MoreInterview: Louis Parks on “Securing Our Future” with Peggy Smedley
Louis Parks (CEO, SecureRF) recently appeared on The Peggy Smedley Show podcast (Episode 545). In a segment titled “Securing Our Future,” Parks covered the history of public-key security, the importance of securing low-resource processors, and SecureRF’s future-proof authentication and data protection solutions for 8-, 16-, and 32-bit processors. Parks also explained the threat quantum computers pose…
Read MoreSecureRF Solutions Named “Best Technology” for 2017 by The Linley Group
SecureRF has received The Linley Group’s 2017 Analysts’ Choice Award for “Best Technology.” Selected from a strong list of innovative security providers, SecureRF is being recognized for its quantum-resistant, public-key solutions, including Walnut Digital Signature Algorithm™ (WalnutDSA™) and Ironwood Key Agreement Protocol™ (Ironwood KAP™), which provide fast, small-footprint, ultra-low-energy authentication and data protection for low-resource devices.…
Read MoreNIST Accepts SecureRF’s WalnutDSA for Evaluation
SecureRF’s Walnut Digital Signature Algorithm (WalnutDSA) has been accepted by the National Institute of Standards and Technology (NIST) for evaluation as a standard for post-quantum, public-key cryptography. NIST expects to perform multiple rounds of evaluation over a period of three to five years on all of the methods submitted. WalnutDSA is a fast, easy-to-implement, low-energy solution…
Read MoreIoT Security News: DoS Attack at Your Door and Semiconductor Stats
IoT security and semiconductor industry growth were two of hottest tech-related topics in 2017. Every few weeks, we learned about next-generation IoT hacks, new security-related legislation, and exciting advances in processor technology. Here are a few interesting news items from the past month. A DoS Attack at Your Door Amazon Key is a new delivery…
Read MoreBeware the Holiday Hack
Most online 2017 holiday gift guides have one thing in common: IoT gadgets. Wi-Fi video doorbells, wearable health monitors, phone-controlled toy robots, and “smart” ovens are just a few of the thousands of Internet-connected products being offered this holiday season. Such gifts might seem like safe products to give or receive, but reports about recent…
Read MoreNew Paper: Kayawood Key Agreement Protocol
SecureRF has published a new paper, “Kayawood, a Key Agreement Protocol,” which introduces a group-theoretic key agreement protocol that leverages the known NP-Hard shortest word problem (among others) to provide an Elgamal-style, Diffie-Hellman-like method. The paper also discusses the implementation of and behavioral aspects of Kayawood, introduces new methods to obfuscate braids using Stochastic Rewriting, and…
Read More