Request Your Free IoT Embedded Security SDK

Need to secure your 8-, 16-, or 32-bit solution? The IoT Embedded Security Development Kit enables you to use Veridify’s quantum-resistant, low-resource, Group Theoretic-based cryptography to provide authentication, confidentiality, and non-repudiation for your own devices.

Included in the IoT Embedded Security SDK:

  • Usage documentation
  • IDE project and configuration files
  • Crypto library
  • Sample C code
  • Sample keys, certificate, and digital signatures

Applications:

  • Interconnected sensors and actuators
  • Very low resource remote IoT devices
  • Passively-powered IoT devices

Fill out the form to request the IoT Embedded SDK.  A member of the Veridify team will be in touch to ensure you receive the support and guidance needed to make a quick start.

 

Need to know more before requesting the IoT Embedded SDK? These details should help you decide. 

Internet of Things (IoT) devices come in a myriad of sizes ranging from highly constrained 8-bit sensors and actuators to more powerful base station controllers and gateway devices. They also communicate over a variety of protocols. The one thing they have in common is that they all must be secure. Veridify provides public-key (asymmetric) security solutions for low-resource devices. Our ultra-low-energy, fast, and small-footprint solutions are ideally suited for 8-, 16-, and 32-bit processors.

IoT Embedded Security SDK

Veridify's IoT Embedded Security SDK is delivered in object file format and is available for the MSP430, ARM Cortex M0/M3, the 8-bit 8051 and other microcontrollers. Compilers supported include TI Code Composer Studio, GCC, IAR, and Keil. Please contact Veridify if you have other requirements.

Key Features

  • All provided functions run faster, and with lower energy consumption, than ECC
  • Low code footprint, low RAM requirements
  • Security level: 2 ^ 128 (others available–contact Veridify)

Availability

The IoT Embedded Security SDK is available at no cost for a wide range of development environments and target devices. Contact us or complete the form for more details and to order your SDK today.

Veridify's Protocols

  • Ironwood™ Key Agreement Protocol - a Diffie-Hellman-like authentication protocol that establishes a shared secret between two parties. A CMAC of the shared secret (combined with a nonce for replay protection) is used to mutually authenticate the parties, and it may also be used as an encryption/decryption key in order to protect data that is transmitted between the two parties.
  • Walnut™ Digital Signature Algorithm - verifies that a message has been signed with the signer’s Private Key that is associated with a signer’s key. This is done by hashing the message to a constant length and verifying that the message digest and signature can be verified against the signer’s Public Key. WalnutDSA™ delivers more efficient performance over current commercial solutions like Elliptic Curve Cryptography’s Digital Signature Algorithm (ECDSA).