Background Information

Keeping IoT devices secure is extremely important to the well being of the public. What we need to secure is the communication between the source and the IoT device. How do we do this?

To this, we need to encrypt the data. Different companies have tried different encryption schemes for IoT devices. Almost all of the known encryption schemes work with either Symmetric or Asymmetric Key Encryption.

With symmetric key, we have the same key for both the encryption and decryption side. This is advantageous as this encryption algorithm uses less memory and computational power. On the other hand, symmetric key is open to hacking as the key is the same for all devices. SOPHOS, an IT security company uses symmetric key encryption.

Thus, we settle on asymmetric key. Asymmetric key encryption has a different key for encryption and decryption. Thus, it takes more memory and requires a lot more computational power. It is less open to hacking and is more secure because a different key is being used for each device.

It is also important to note some examples of encryption algorithms. The examples include Triple DES, RSA, Blowfish, Twofish, and AES. Triple DES is a symmetric encryption algorithm while RSA is an asymmetric encryption algorithm.

Interesting Fact: Public Key Encryption is another name for Asymmetric Key Encryption.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s