Hacker News new | past | comments | ask | show | jobs | submit login

Doing reasonable encryption and authentication on interfaces with MTUs on the order of tens of bytes (which is common for various low-power IoT radio interfaces) is actually pretty complex problem.

Essentially all widely used and safe cryptographic constructions have overhead (IV and MAC tag for example) that would consume significant portion of your packet (or in some cases is actually larger that the packet).




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: