Encrypt IoT

Security    Clarity    No-BS

MQTT encryption done right

Teserakt's E4 is the first and only end-to-end encryption solution for MQTT, the most popular machine-to-machine protocol, supported by all leading cloud platforms.

E4 allows you to transmit sensitive data over MQTT without worrying about the broker's security. Your messages remain secret even if the broker is compromised by an insider or remote attacker.

We not only protect messages, but also handle key management, the hardest problem in machine-to-machine encryption. E4 allows you to remotely manage millions of devices with no performance hit.

Seamless integration

  • Thin client software library with no external dependency
  • Server deployed as containerized application or virtual appliance
  • No change to the broker required

End-to-end security

  • All messages encrypted, protected against replay and spoofing
  • Protects against compromised broker servers and infrastructure
  • Safe against quantum computing

Key management

  • Automation of key rotation policies for higher security
  • Live analytics, anomaly detection, and monitoring service
  • Web UI, REST, and gRPC interfaces

Company

Teserakt AG is an international company co-founded in 2018 in Switzerland by noted cryptographer JP Aumasson and serial entrepreneur Alan Duric.

We want to make strong encryption the default for IoT and machine-to-machine communications.

We rely on our experience building secure communication software and industrial cryptography systems. Security protocols and algorithms that we designed are now deployed in millions of devices, and some have become international standards.

We have customers in diverse sectors, such as aerospace and law enforcement technology.

Find our latest news on Twitter, our open-source contributions on GitHub, our company profile and staff list on LinkedIn, and our technical posts on the blog Things' Security.

Security

Cryptography is our core expertise—we designed algorithms now used in the Linux kernel and Apple devices.

A security product should improve your security posture, not diminish it.

Clarity

No bells and whistles; we are not ashamed to say that our solution is simple and only supports a handful of parameters.

"Complexity is the enemy of security" is cliché but true.

No-BS

Many security companies prioritize marketing over engineering and security. We don't.

No "military-grade" here, no claims of using AI when we don't use it.

Partners

Teserakt is proud to have the following business partners:


Resources

Slide decks:

Our open-source repositories:

  • PQGo: Experimental post-quantum cryptography for the Go language, using cgo wrappers over reference of submissions to the NIST Post-Quantum Cryptography Standardization project
  • SHA3-AVR: Implementation of the SHA-3 hash functions for 8-bit AVR

To learn more about MQTT and its security, we recommend the following external resources: