Secure the IoT: Part 1, Public Key Cryptography Secures Connected Devices

By: Yann Loisel

Abstract: This application note is the first of two discussing the security of the IoT. It describes how to identify and then assess the security risks for a connected electronic device. It explains how the best, proven security is designed into electronic devices and loaded during manufacture. The focus is on countermeasures, specifically public key-based algorithms.