Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
Announcing CryptoCompact
October 15, 2013 •Ray Potter
Somewhere, Sasquatch is crying. Apologies to the hairy fella. Bigfoot just isn't welcome here.
Or here.
Wearables have arrived, but their space and processing constraints have made it extremely challenging to integrate the relatively large footprint of cryptographic modules. This dilemma has perplexed many, generally resulting in shrugs and lack of action. 'Until these devices are more popular, hackers won't bother.'
Unfortunately, the ostrich approach just isn't going to work. The capacity of Wearables is tiny, but the data itself is extremely significant. Consider all of the highly personal information that is gathered by Wearables - not just location and time, but physical habits. Some are designed specifically to archive heart rates and diagnostic data. The sky is the limit here, both for altruistic goals and malicious. It's like a 007 movie come to life, and you can bet that the villains will surface now that the technology exists in the mainstream. We can't sit and wait for the bad guys to strike first.
Seeing these devices catch traction is very, very cool. It's aways amazing to watch new tech develop and be embraced by the masses. But more importantly, it's an opportunity and we have a responsibility to ensure that it doesn't become a nightmare. Developers are already working on enterprise applications and concepts for mass deployment of these devices. The data must be secured, and our first challenge is to address the dilemma presented by the device capacity. Encryption modules carry weight that isn't factored into the design specifications for these constrained devices, hence the need for a module with a tiny footprint. The trick is that it still needs to pack enough punch to power the apps and the security solutions that are sure to follow.
Today, I'm speaking at the Silicon Valley Telecom Council's Wearables event at the CTIA MobileCON 2013, and I'm proud to announce CryptoCompact, only from SafeLogic.
The premise is simple. We started with the same goals as CryptoComply - unrivaled cryptographic performance with the easiest implementation and best support in the business. Then, we took out the bells and whistles and streamlined the module to run as fast as possible with the smallest footprint possible, but without sacrificing features needed today and for the future. And rest assured, CryptoCompact will uphold our standards for world class encryption by earning its own FIPS 140-2 validation.
I'm extremely excited about this new product and I can't wait to share more details. Check out the CryptoCompact page, including information about our pilot program. If you're developing apps for Wearables, definitely send us a submission. We'll be providing the CryptoCompact module to select developers during the testing period. Stay tuned for more details!
Ray Potter
Ray Potter is the Founder of SafeLogic, which was spun off from his previous venture, the Apex Assurance Group consulting firm. He brings over 20 years of security and compliance experience, including leading teams at Cisco and Ernst & Young, to the operations team at SafeLogic. Ray loves playing guitar and flying airplanes.
Popular Posts
Search for posts
Tags
- FIPS 140 (111)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (18)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- post-quantum cryptography (11)
- Cloud (9)
- PQC (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- OpenSSL 3.x (3)
- POA&M (3)
- TLS 1.3 (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)