Protected againsT vulnerable iot devices

Secure your IoT devices

As the Internet of Things (IoT) evolves, and industrial systems become better connected, such attacks are likely to increase. Engineers and executives need to ask themselves when, not if, an attack will occur against their IoT solution. The only way to guard against such attacks effectively, and ensure the overall technology is resilient, is by building security into the solution at its inception
Protect Your Data and Secure IOT devices

Don't leave your IoT devices vulnerables against firmware tampering or take-over

Today’s IoT are equipped with more software than the most sophisticated machines of our time
ZERO-TRUST ON YOUR IOT

Keep Your IoT firmware updates secured

As connected devices continue to increase in number, it is increasingly challenging for enterprises to secure them and keep threats at bay. Fraught with vulnerabilities and offering an attack surface ripe for security breaches, IoT devices are attractive targets for cybercriminals. Whether enterprises are just starting out with IoT adoption or looking to expand their established IoT networks, all face similar challenges when it comes to managing, monitoring and securing their connected IoT environments. To successfully secure IoT devices, there are a few things enterprises should consider

system protection-01

DuoKey help us to safeguard and protect all our connected vehicule with end-to-end secured Over the Air firmware update with keys protected using Multi-Party Computation

Domain After-Sales Architect
CarAutoMotive
END-TO-END ENCRYPTED COMMUNICATION PROTOCOL WITH ZMQ

Secure communication with your IoT using our ZeroMQ MPC encryption

CurveZMQ is a protocol for secure messaging across the Internet that closely follows the CurveCP security handshake. CurveZMQ aims to provide the same level of security as CurveCP. That is, it aims to prevent eavesdropping, fraudulent data, altered data, replay attacks, amplification attacks, man-in-the-middle attacks, key theft attacks, identity attacks, and certain denial-of-service attacks.

 

END-TO-END ENCRYPTED COMMUNICATION PROTOCOL WITH ZMQ

Protect your keys with MPC

CurveZMQ uses the Curve25519 elliptic curve, which was designed by Daniel J. Bernstein to achieve good performance with short key sizes (256 bits). The protocol establishes short-term session keys for every connection to achieve perfect forward security. Session keys are held in memory and destroyed when the connection is closed. They are exchanged during the handshake and are used to encrypt every messages MESSAGE between Client and Server. CurveZMQ also addresses replay attacks, amplification attacks, MITM attacks, key thefts, client identification, and various denial-of-service attacks.

Clients and servers have long-term permanent keys, and for each connection, they create and securely exchange short-term transient keys. Each key is a public/secret keypair, following the elliptic curve security model.

With DuoKey we replace long-term private keys by MPC keys (i.e., no stored in memory anymore)

keep your sensitive data private