Request Your Free IoT Embedded Security SDK
Need to secure your 8-, 16-, or 32-bit solution? The IoT Embedded Security Development Kit enables you to use Veridify’s quantum-resistant, low-resource, Group Theoretic-based cryptography to provide authentication, confidentiality, and non-repudiation for your own devices.
Included in the IoT Embedded Security SDK:
- Usage documentation
- IDE project and configuration files
- Crypto library
- Sample C code
- Sample keys, certificate, and digital signatures
Applications:
- Interconnected sensors and actuators
- Very low resource remote IoT devices
- Passively-powered IoT devices
Fill out the form to request the IoT Embedded SDK. A member of the Veridify team will be in touch to ensure you receive the support and guidance needed to make a quick start.
Need to know more before requesting the IoT Embedded SDK? These details should help you decide.
Internet of Things (IoT) devices come in a myriad of sizes ranging from highly constrained 8-bit sensors and actuators to more powerful base station controllers and gateway devices. They also communicate over a variety of protocols. The one thing they have in common is that they all must be secure. Veridify provides public-key (asymmetric) security solutions for low-resource devices. Our ultra-low-energy, fast, and small-footprint solutions are ideally suited for 8-, 16-, and 32-bit processors.
IoT Embedded Security SDK
Veridify's IoT Embedded Security SDK is delivered in object file format and is available for the MSP430, ARM Cortex M0/M3, the 8-bit 8051 and other microcontrollers. Compilers supported include TI Code Composer Studio, GCC, IAR, and Keil. Please contact Veridify if you have other requirements.
Key Features
- All provided functions run faster, and with lower energy consumption, than ECC
- Low code footprint, low RAM requirements
- Security level: 2 ^ 128 (others available–contact Veridify)
Availability
The IoT Embedded Security SDK is available at no cost for a wide range of development environments and target devices. Contact us or complete the form for more details and to order your SDK today.
Veridify's Protocols
- Ironwood™ Key Agreement Protocol - a Diffie-Hellman-like authentication protocol that establishes a shared secret between two parties. A CMAC of the shared secret (combined with a nonce for replay protection) is used to mutually authenticate the parties, and it may also be used as an encryption/decryption key in order to protect data that is transmitted between the two parties.
- Walnut™ Digital Signature Algorithm - verifies that a message has been signed with the signer’s Private Key that is associated with a signer’s key. This is done by hashing the message to a constant length and verifying that the message digest and signature can be verified against the signer’s Public Key. WalnutDSA™ delivers more efficient performance over current commercial solutions like Elliptic Curve Cryptography’s Digital Signature Algorithm (ECDSA).