event-icon
Description
The IoT has a problem: the small devices that power the IoT have few, if any, options for providing authentication and data integrity. These embedded devices lack the computing, memory, and energy resources needed to implement legacy security methods. This leaves most IoT systems vulnerable to attack. We'll introduce Group Theoretic Cryptography (GTC) as an alternative. We'll show how to incorporate quantum-resistant, GTC-based security into real-world products. You'll learn about cryptographic libraries that you can incorporate into your code, and we'll cover IP cores that implement GTC methods together with sample run-times and resource utilization.
Tags