The most secure
IoT and M2M encryption.

Security    Clarity    Performance

IoT encryption done right – Optimized for MQTT

Teserakt's E4 is the first end-to-end encryption and key management solution for IoT messaging.

E4 is more secure than TLS, because TLS only encrypts messages between a client and a server, leaving messages exposed to a relay server compromised by an insider or remote attacker. Instead, messages protected with E4 can only be decrypted by their recipients (end-to-end encryption)

E4 is more efficient than TLS, and will run on the most underpowered platforms, thanks to its minimal memory footprint and high-speed cryptography. Messages protected with E4 are only 24 bytes longer than the original messages.

E4 supports millions of devices with a single instance. It is designed with scalability in mind, and is powered with state-of-the-art observability from the OpenCensus suite. Optimized for MQTT, the most popular IoT protocol, E4 is compatible work with the IoT platforms of AWS, IBM, and Google.

Seamless integration

  • No change to the broker required
  • Server deployed as containerized application or virtual appliance
  • Thin client library compatible with all platforms (ARM, AVR, Intel, etc.)

End-to-end security

  • All messages encrypted, protected against replay and spoofing
  • Protects against compromised broker servers and infrastructure
  • Safe against quantum computing

Key management

  • Remotely create and manage keys without a complex PKI
  • Define and automate key rotation policies using our scripting engine
  • Web UI and APIs (HTTP and gRPC)


Teserakt AG was founded in 2018 in Switzerland by noted cryptographer JP Aumasson and serial entrepreneur Alan Duric. Our goal is to establish strong encryption as standard in IoT and machine-to-machine communications.

We rely on our experience building secure communication software and industrial cryptography systems. Security protocols and algorithms that we designed are now deployed in millions of devices, and some have become international standards.

We have customers in diverse sectors, such as aerospace and law enforcement technology.


Cryptography is our core expertise. We designed algorithms now used in the Linux kernel and Apple devices.

We design secure software. A security product should improve your security posture, not diminish it.


No bells and whistles. We are not ashamed to say that our solution is simple and only supports a handful of parameters.

"Complexity is the enemy of security" is cliché but true.


Be it CPU, memory, or bandwidth, we minimize resources usage thanks to a meticulous choice of algorithms and software components.

Our technology runs on even the most constrained platforms.


  • 2019/03/08 · We give a talk at the crypto seminar organized by the French Minister of Defense
  • 2019/02/08 · Wired cites us in a piece about Google's new mobile disk encryption technology
  • 2019/01/21 · Our audit of OpenSSL's pseudo-random generator is published by OSTIF
  • 2018/12/02 · We open-source PQGo, our experimental post-quantum library for Go
  • 2018/11/21 · We announce a partnership with VerneMQ, provider of an open-source and highly scalable MQTT broker, fully supported by Teserakt's E4
  • 2018/11/19 · We announce a partnership with P3KI, provider of a secure access delegation technology that is complementary to Teserakt's encryption technology
  • 2018/11/01 · We contribute an article in the French scientific magazine La Recherche
  • 2018/09/14 · Teserakt AG is registered in Switzerland under UID CHE-414.027.875
  • 2018/09/06 · We open-source SHA3-AVR, our compact version of SHA-3 for AVR chips