Key Exchange Video

Many suppliers offer hardware roots-of-trust but this is only a partial solution.

Rubicon not only provides a hardware root-of-trust but also provides a secure end-to-end system from the edge of your cloud or IoT network to the heart of the enterprise.

Rubicon Labs Device Activation and Key Exchange from Rubicon Labs on Vimeo.

 

Glossary of Terms

AES: Advanced Encryption Standard. A standardized symmetric-key block cipher algorithm used worldwide. Basically, a scrambler that can only de-scramble using a secret key.

DDS: Distributed Device Service. The Rubicon cloud service that facilitates device activation and key exchange. It can be centralized or distributed into multiple servers, allowing several parties to participate in device management.

Hashing function: Turns big blocks of data into small numbers via a mapping function. This creates a fixed digital fingerprint for data of any input size. Great for checking the integrity of a large amount of data. Since the mapping is one way, knowing a hashed value doesn’t let you reconstruct the input.

Keyed-hash message authentication code (HMAC): Used for checking the authenticity of data (to determine if it has been modified), as well as the authenticity of data (verify who created it). HMACs are a fundamental building block of Rubicon technology.

OTP key: One-Time Programmable key. A number that’s only valid once. It can be discovered later by an attacker with no threat to security. That’s what makes them safe to burn into hardware.

Session key: A single-use key used to encrypt messages between Rubicon devices and servers.

XOR: The logic operation of exclusive OR, it only outputs TRUE when both inputs are different. An algorithm commonly used as an additive cipher that Rubicon uses when provisioning a device with an activation key.

Watch Next Video: FreeScale Technology Forum Keynote Presentation →