info@veridify.com +1 203.227.3151

Learn about a light-weight, quantum-resistant authentication solution for low-resource processors. 

Engineers, developers, and embedded security experts face a major challenge. Low-resource devices, running on 8-, 16-, and 32-bit processors, lack the computing and memory resources needed to incorporate contemporary security methods like Elliptic Curve Cryptography (ECC). During a talk at Connect Security World 2017, SecureRF’s CTO Derek Atkins presented the company’s security solutions, which are ideally suited in terms of size, speed, and power for the small processors powering the IoT. Based on Group Theoretic Cryptography methods, SecureRF’s tools are at least 60 times faster than ECC and consume up to 140 times less energy.

The presenation covered:

  • How to add public-key authentication services into constrained devices
  • Small code size, fast-running, quantum-resistant public-key authentication for IoT
  • The interesting (and different) math that is the foundation of these techniques
  • How to incorporate low-resource cryptography into your own IoT devices