Our battle tested system is used in the hostile DoD environments. We are able to track individual chips through the supply chain and in fielded use. Our patented device identification method scales easily, compliments other existing technologies, and is perfect for IoT devices.
Radiation Hardened- why is it important?
If we want to work with Elon Musk and SpaceX, we better be prepared to make components that can survive hostile environments. For now, we feel accomplished actively supporting low orbit devices... but we can dream.
The root of trust the is singularity from which all security is built.
Our devices are designed with an inherent "Root of Trust", which is necessary for implementing a "chain of custody" and true provenance tracking.
The point of Quantum Encryption is to protect data from Quantum Computers able to decode encryption we all use today. Standard encryption is vulnerable because everything is based on mathematical processes. To increase security, we have always increased the complexity of the encryption. Quantum Computers can out perform the complexity, so new encryption sources and schemes are needed. SecureFoundry has taken a different path and it has made all the difference.
Low power consumption is great for many reasons.
- Extends component longevity
- Helps Prevent Physical Attacks (Side Channel)
Our current system uses nanomps (nA) to execute operations on the chip. Any signature created hides in the noise of electricity. Not only is the electrical signal of the device obfuscated, we also have quantum encryption to protect data as it leaves the system.
In computing, a hardware random number generator or true random number generator is a device that generates random numbers from a physical process, rather than by means of an algorithm. Our processes are, in theory, completely unpredictable, and the processes assertions of unpredictability are measured in entropy. Cheap IoT devices has a significantly limited "pool" of available entropy, which hurts their ability to encrypt. Depending on how much encryption is occurring a large pool is needed. Ours is unlimited.