Digital anonymity: The ultimate luxury item
Data is quickly becoming the currency of the digital society, of which we are all now citizens. Let’s call that “Digitopia.” In Digitopia, companies and governments just can’t get enough data. There is...
View ArticleShouldn’t security be a standard?
Security matters now more than ever, so why isn’t security a standard feature in all digital systems? Luckily, there is a standard for security and it is literally standards-based. It is called TPM....
View ArticleECDH key exchange is practical magic
What if you and I want to exchange encrypted messages? It seems like something that will increasingly be desired given all the NSA/Snowden revelations and all the other snooping shenanigans. The joke...
View ArticleDon’t be an “ID-IoT”
Authentication may just be the “sine qua non” of the Internet of Things. Let’s just come out and say it: Not using the most robust security to protect your digital ID, passwords, secret keys and...
View ArticleGetting up close and personal with symmetric session key exchange
In today’s world, the three pillars of security are confidentiality, integrity (of the data), and authentication (i.e. “C.I.A.”). Fortunately, Atmel CryptoAuthentication crypto engines with secure key...
View ArticleWhat is Ambient Security?
New technology and business buzzwords pop up constantly. Hardly a day goes by that you don’t see or hear words such as “cloud”, “IoT,” or “big data.” Let’s add one more to the list: “Ambient security.”...
View ArticleSymmetric or asymmetric encryption, that is the question!
With the emergence of breaches and vulnerabilities, the need for hardware security has never been so paramount. Confidentiality — one of the three foundational pillars of security, along with data...
View ArticleAtmel’s SAM L21 MCU for IoT tops low power benchmark
SAM L21 MCUs consume less than 940nA with full 40kB SRAM retention, real-time clock and calendar, and 200nA in the deepest sleep mode. The Internet of Things (IoT) juggernaut has unleashed a flurry of...
View ArticleThe CryptoShield is a dedicated security peripheral for the Arduino
This shield adds specialized ICs that will allow you to implement a hardware security layer to your Arduino project. With the insecurity of connected devices called into question time and time again,...
View ArticleThe “three-legged stool” of cryptography
Implementing true IoT requires a three-pronged approach, like a three-legged stool. Implementing true security in Internet of Things (IoT) devices requires a three-pronged approach. Like a...
View Article