Used for identity management through generating digital signatures and certificate requests, and for implementing key exchange mechanisms. Examples of frequently used cryptographic algorithms include RSA, Elliptic Curve and Diffie-Hellman. There is also a range of new algorithms being standardized by NIST to provide effective post-quantum cryptography.
Used for data transfer to and from connected endpoint devices. Symmetric keys are typically 128-bit or 256-bit, while it takes a 2048-bit asymmetric key to provide a broadly similar level of security to that of a 128-bit symmetric one. IoT deployments create a lot of data, so speed is important. Also, storing smaller keys requires less silicon area on semiconductor devices, where space is at a premium. The most common example here is AES.
Used for integrity checking, ensuring that received data has not been tampered with.
Itec Ltd.
Address: 38th HaBarzel St., Ramat Hachayal
Tel-Aviv 6971054
Tel: 972-3-6491202
Email: info@itec.co.il
WhatsApp us