Strong authentication protocols will be essential to keeping data safe

Vint Cerf is known as a “father of the Internet,” and like any good parent he worries about his offspring most recently, the IoT “Sometimes I’m terrified by it” – ITWorld

Security market - time to change

The security market is fundamentally broken…The approach that our industry has taken is irreparably flawed, and we have to change.” RSA President Amit Yoran, eWeek – RSA Changing Internally Along With Rest of Security World

A new security model

If IoT is ever going to work, networks will need to grant access to devices that today we’d refuse outright…The challenge before us is nothing short of reinventing security.”  InformationWeek – Internet Of Things Will Turn Networks Inside-Out

Modern, lightweight Security

“Because the majority of modern cryptographic algorithms were designed for desktop/server environments, many of these algorithms cannot be implemented in (IoT) devices…When current algorithms can be engineered to fit into the limited resources of constrained environments, their performance is typically not acceptable.” NIST

Secure the Internet of Things

“If we don’t have a fundamentally new security model, then I don’t know how we’re going to enjoy the internet of things. Patch Tuesday for your car or your insulin pump doesn’t make a whole lot of sense.” Dan Kaufman, Director Information Innovation Office at DARPA.

IoT Security - needs to be better

“There’s nothing you can do. This is very much like the computer field in the ‘90s. No one’s paying any attention to security, no one’s doing updates, no one knows anything – it’s all really, really bad and it’s going to come crashing down.” Bruce Schneier

NIST official : IoT needs defense

“The interconnectivity of the Internet of Things (IOT) leaves public and private computer systems essentially indefensible, and no amount of security guidance can provide salvation”

About us

Relevant Security Corp provides Real Privacy Management™ (RPM) technology that offers transaction-level continuous, mutual authentication and security for data and electronic communications between all nodes on any network.

How it works

Relevant Security has developed applications for using RPM to secure IP networking, VPN, WAN optimization, Web traffic, email, instant messaging, file transfer, VoIP, mobile data, mobile commerce, mobile communications, enterprise search, and enterprise data security.

Faster

with near real-time performance improving, network operation

Smaller

10KB code size so security can be embedded in any device and any protocol

Flexible

supports true federated trust, allowing you to place trust nodes in any topology to support secure peer-to-peer or network transactions

Simpler

to understand, validate, integrate, use and maintain

More secure

using continuous authentication, securing every transaction

Real Privacy Management™

Introducing RPM™, lightweight cryptography for providing security and privacy for any device on any network.

Real-Time Continuous Mutual Authentication and Encryption

RPM is an advanced, secret key-based continuous mutual authentication and security method, including lightweight stream ciphers. RPM was built to secure transactions and data from any variety of servers and devices, including sensors, IC, ASIC, SoC, embedded systems and the Internet of Things (or Everything). RPM is lightweight, stronger and faster than traditional security methods.

Benefit from RPM security

RPM is faster, smaller, more efficient, and more flexible than other security techniques. RPM has been tested by an independent lab to be hundreds of times faster than other algorithms. This performance allows RPM to be used where other techniques fail, such as time constrained applications like embedded systems, mobile, and RF protocols that require fast connection speeds.

The speed of RPM is what provides the ability for continuous authentication and encryption. RPM is able to authenticate both parties (mutual authentication) for every transaction of any application due to the speed at which the authentication is performed. RPM is fast enough to mutually authenticate and encrypt every packet in protocols like TCP, UDP, SIP, IP, etc.

The RPM authentication process is done in 5 microseconds in software. VHDL and Verilog simulations show that RPM operates at line speed when used in FPGA (Field Programmable Logic Arrays), ASIC (Application Specific Integrated Circuits),  IC (Integrated Circuit) or SoC (Sytem on Chip) implementations.

RPM is also much smaller than other security methods. Since the RPM libraries are 10KB or less in size they can easily be integrated with applications requiring security, while coserving space. This small size allows RPM to be placed in embedded systems like RFID, IC, SoC (Systems on Chip), ASIC and FPGA.

RPM performance has very little overhead. Measurements have shown that RPM performs at 2 – 5% network overhead with TCP/IP, which is within the typical “noise level” of IP network transmissions. So using RPM does not add additional overhead for the continuous authentication and security that RPM provides.

RPM is also more flexible in its trust model. Applications have different trust models based on the network topology, business logic and information processing that the application is representing. RPM offers the flexibility to add authentication and security to any network and communications topology, whether peer-to-peer or a trusted communications network.

RPM gives your business flexibility in implementing trust according to your own business model, without requiring third parties.

Get RPM for your application.

Address

Relevant Security Corp. 
990 South Broadway, Suite 300 
Denver, CO 80209

Corporate Headquarters

Greg Byles

+1-303-991-2167

gbyles@gtri.com

Washington, DC Area

Glenn Veach

+1-703-476-2929

gveach@rscorp.com