{"id":33021,"date":"2019-12-04T03:25:00","date_gmt":"2019-12-04T08:25:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=33021"},"modified":"2019-12-04T03:25:00","modified_gmt":"2019-12-04T08:25:00","slug":"the-debate-over-how-to-encrypt-the-internet-of-things","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/12\/04\/the-debate-over-how-to-encrypt-the-internet-of-things\/","title":{"rendered":"The Debate Over How to Encrypt the Internet of Things"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/www.wired.com\/contributor\/lily-hay-newman\">LILY HAY NEWMAN<\/a> &#8211; Internet-connected gadgets like light bulbs and fitness trackers are\u00a0<a href=\"https:\/\/www.wired.com\/story\/upnp-router-game-console-vulnerabilities-exploited\/\">notorious<\/a>\u00a0for\u00a0<a href=\"https:\/\/www.wired.com\/story\/iot-security-next-step\/\">poor security<\/a>. That&#8217;s partly because they\u2019re often made cheaply and with haste, which leads to\u00a0<a href=\"https:\/\/www.wired.com\/story\/pacemaker-hack-malware-black-hat\/\">careless mistakes<\/a>\u00a0and outsourcing of\u00a0<a href=\"https:\/\/www.wired.com\/story\/iot-security-next-step\/\">problematic parts<\/a>. But it\u2019s also partly due to the lack of computing power in the first place; it&#8217;s not so easy to encrypt all that data with limited resources. Or at least that\u2019s how the conventional wisdom goes.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2016\/11\/08\/11\/48\/neo-urban-1808082_960_720.jpg\" alt=\"\" width=\"245\" height=\"157\"\/><\/figure><\/div>\n\n\n\n<p>But real-world data suggests that many of those ubiquitous tiny gadgets\u00a0<em>can<\/em>\u00a0run versions of traditional, time-tested encryption schemes. A team from the Swiss <strong>IoT <\/strong>encryption firm Teserakt argues that there&#8217;s no need to reinvent the wheel when the real solution is simply holding IoT manufacturers to higher standards. They made their case at a National Institute of Standards and Technology\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/csrc.nist.gov\/Events\/2019\/Lightweight-Cryptography-Workshop-2019\" target=\"_blank\">conference<\/a>\u00a0in Maryland this month focused on developing \u201clightweight\u201d cryptography for embedded devices.<\/p>\n\n\n\n<p>But traditional cryptography, particularly the stalwart Advanced Encryption Standard, often works just fine in <strong>IoT <\/strong>devices, says Antony Vennard, Teserakt&#8217;s chief engineer. The researchers have even observed a number of situations where security-conscious manufactures found ways to incorporate it, like in the embedded systems of cars. And other, independent studies have had\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.cosic.esat.kuleuven.be\/ecrypt\/cryptofor2020\/slides\/lightweight_crypto.pdf\" target=\"_blank\">similar findings<\/a>.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.wired.com\/story\/lightweight-encryption-internet-of-things\/&amp;ct=ga&amp;cd=CAEYBCoSODkwNDk4MTM1NjA1NDAwMTE4MhphMmQ3NWEwMTQ5YTgyMWQ3OmNvbTplbjpVUw&amp;usg=AFQjCNFz8pL0geobK7f7b7YXMZUKXxWZJQ\">Read On:<\/a><\/p>\n\n\n\n<iframe style=\"width:120px;height:240px;\" align=\"left\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" frameborder=\"0\" src=\"\/\/ws-na.amazon-adsystem.com\/widgets\/q?ServiceVersion=20070822&#038;OneJS=1&#038;Operation=GetAdHtml&#038;MarketPlace=US&#038;source=ss&#038;ref=as_ss_li_til&#038;ad_type=product_link&#038;tracking_id=cyberconservi-20&#038;language=en_US&#038;marketplace=amazon&#038;region=US&#038;placement=B07YNLK9LX&#038;asins=B07YNLK9LX&#038;linkId=5209c4903f966bcdfd200ea5708253f8&#038;show_border=true&#038;link_opens_in_new_window=true\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>By LILY HAY NEWMAN &#8211; Internet-connected gadgets like light bulbs and fitness trackers are\u00a0notorious\u00a0for\u00a0poor security. That&#8217;s partly because they\u2019re often made cheaply and with haste, which leads to\u00a0careless mistakes\u00a0and outsourcing of\u00a0problematic parts. But it\u2019s also partly due to the lack <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/12\/04\/the-debate-over-how-to-encrypt-the-internet-of-things\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[649,626],"tags":[650,627],"class_list":["post-33021","post","type-post","status-publish","format-standard","hentry","category-internet-of-things","category-iot","tag-internet-of-things","tag-iot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=33021"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33021\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=33021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=33021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=33021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}