MENU

Asymmetric cryptography for low-resource IoT devices to be demonstrated

Asymmetric cryptography for low-resource IoT devices to be demonstrated

Technology News |
By Rich Pell



The WalnutDSA and Ironwood key agreement protocol from SecureRF offer more efficient performance than Elliptic Curve Cryptography (ECC) on a small 8-bit processor, which is the class of processor that you’d likely find on a sensor or actuator device.

Most IoT devices, like the 8-bit processor in SecureRF’s demonstration, require authentication and data protection but don’t have the computing and memory resources to incorporate contemporary security with acceptable runtimes and resource allocation. SecureRF addresses these issues by providing authentication and data protection for IoT devices with security implementations that are up to 60x more efficient than ECC and consume over 140x less energy.

WalnutDSA verifies that a message has been signed with a trusted third-party’s private key. This is done by hashing the message to a constant length and verifying that the message digest and signature can be verified against the signer’s public key.

Ironwood KAP is a Diffie-Hellman-like authentication protocol that establishes a shared secret between two parties. A CMAC of the shared secret (combined with a nonce) is used to mutually authenticate the parties.

www.securerf.com
www.sensorsexpo.com

If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News

Share:

Linked Articles
10s