SecureRF designs and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things (IoT). The company offers ultra-low-energy, fast, and small footprint solutions ideally suited for 32-bit, 16-bit, and even 8-bit devices like the ARM Cortex M0/M3 and RISC-V processors. The security solutions are used to address wireless sensors, NFC, Bluetooth, and RFID tags and embedded platforms including FPGAs, microcontrollers, and ASICs.
Brands/Products Details:
Walnut Digital Signature Algorithm: It offers integrity, authentication, and non-repudiation between parties such as IoT devices. It has features as follows:
- Synthesizable RTL — In Verilog and VHDL
- Simulation and synthesis scripts — Automation for easy evaluation and implementation
- Test vectors — Facilitates rapid testing
- Verification and regression suites — Full test coverage to ensure design integrity
- Executable C models — Verifies correct output from IP core
- Cryptographic keys — To exercise both the hardware core and the C models
- Interfaces — For Cortex-M0, 8051, and core processor blocks on FPGAs
Ironwood Key Agreement Protocol: It has features as follows:
- Synthesizable RTL — In Verilog
- Simulation and synthesis scripts — Automation for easy evaluation and implementation
- Test vectors — Facilitates rapid testing
- Verification and regression suites — Full test coverage to ensure design integrity
- Executable C models — Verifies correct output from IP core
- Cryptographic keys — To exercise both the hardware core and the C models
- Interfaces — For Cortex-M0, 8051, and core processor blocks on FPGAs
- Documentation and design support — For smooth implementation
- Gate count as implemented in a 65-nm CMOS process: 20,000 typical gate utilizations
- Cycle count to compute shared secret at 128-bit security level: < 10,000 cycles
- FPGA resource utilization, Xilinx xc7z010 — Slice LUTs: 7,122; Slice Registers: 2,324
Hickory Hash Function: Quantum-resistant cryptographic hash function ideal for constrained implementations.
- Many-to-one function, but it is computationally infeasible to find two inputs that result in the same output
- Reuse the underlying engine to save silicon or code space
Sectors/Verticals:
- Communications & Media
- Financial Services
- Open Banking
- PSD2
- Government
- Healthcare
- Retail