Internet of things (IoT) world map with connected devices

Energy-efficient encryption for the internet of things (IOT)

Public-key encryption protocols are complex, and in computer Networks, they’re executed by software. But that will not work in the net of things, an envisioned network that would connect many different sensors — embedded in appliances, vehicles, civil structures, production equipment, and even livestock tags — to servers that are online. Embedded sensors that will need to maximize battery life can’t afford the energy and memory space that software execution of encryption protocols would require. MIT researchers have built a new chip, hardwired to perform Public-key encryption, that consumes only 1/400 as much electricity as software execution of the very same protocols would. Additionally, it uses about 1/10 as much memory and executes 500 times faster. The researchers describe the chip at a newspaper they’re


Cryptography – the Basics

Often described as a holy security politician, measured in encrypted data or rather delimited in the literature as safe computing, raises the question: how can we calculate a function in hidden inflows? In other words, how can we process information that we can not see and at the same time have a comprehensible result? Like a chef who prepares a meal without seeing the ingredients, the safe calculation presents a seemingly impossible problem. How can anyone, even if this person is the most advanced supercomputer in the world, give meaning to data they do not see? Fortunately, cryptography has some tricks that are ordered to defy intuition. Encrypted data computing shows many interesting applications. Conceptually, if we can keep the information private and secure even