top of page
MQTT Deployment
We have created a Symmetric Key Agreement method of protecting the MQTT data communication protocol for IoT data transfer.
We can deliver modern Quantum Cryptography to memory and compute restrained devices that run IoT sensors and functions - embedded at the bootloader (RTOS) level and are many times more resource-efficient than current NIST PQC.
Gold Standard of Post Quantum
Cryptography methods
We can deliver endless Quantum secure encryption keys for use in either Asymmetric or Symmetric key sharing methods, including TLS 1.3 encryption.
Using these three encryption domains (IoT Device + IoT MQTT Data pipe + Public Network 'wire' on TLS 1.3)…
We are the toolkit to protect IoT devices and data for the next generation.
Quantum Safe IoT from Device to Server
1
Quantum Device Security
-
eSIM profile
-
Secure Boot
-
Code Signing
-
Machine Identity
2
Quantum Network Security
-
MQTT
-
TLS
-
DTLS
-
VPN
3
Quantum Application Security
-
Data Signing & Verification
-
Application Messaging: DDS, MQTT
-
Payload encryption (plaintext > cyphertext)
bottom of page