Blog

XChaCha20 and Poly1305

Written by Dominik Joe Pantůček on 2019-01-03

cryptoucan

With symmetric key to protect all Cryptoucan™ secrets, it is necessary to use it properly both for symmetric encryption of the private data but also for ensuring the integrity of whatever is stored on the flash memory. Read on to learn more about our cipher and message authentication code of choice.

...

BLAKE2 embedded implementation

Written by Dominik Joe Pantůček on 2018-12-27

cryptography

Developing a cryptographic device requires going through all different parts of the system to deliver something the user can really trust. Read on to see why you should care what cryptographic primitives and how your devices use internally.

...

Cryptoucan™ cryptographic model

Written by Dominik Joe Pantůček on 2018-12-20

cryptoucan

Creating a truly secure cryptographic storage requires thinking hard about the cryptographic model for protecting the secret keys. Read on to see the approach we have designed and implemented.

...

Cryptoucan™ on Windows

Written by Dominik Joe Pantůček on 2018-12-13

cryptoucan

Apart from electrical and mechanical testing, we were heavily working on ensuring seamless integration on the very uncommon Windows platform. Read on to get an idea what it looks like when you come from the world where things just work to the world of Windows.

...

Cryptoucan™ PCB visual control

Written by Dominik Joe Pantůček on 2018-12-06

cryptoucan

Basic computer vision algorithms may aid you in performing visual control of whatever you may be manufacturing. But if you want something more, you need to turn to the magic world of ... linear algebra. Read on to see how all those little vectors and matrices help us with QA.

...