• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cypherbridge Systems

IoT Security Solutions

MENUMENU
  • Company
    • About Cypherbridge
    • Company Blog
    • Industry Partners
    • Partner Programs
      • NXP
      • Renesas
      • ST
      • Synopsis
      • Texas Instruments
    • Media Kit
  • Verticals
  • Products
    • IoT Device Solutions
    • Chips & Platforms
    • Software Development Kits
      • uLoadXL SDK
      • uVPN SDK
      • uSSL TLS SDK
      • uSSH SDK
      • uCrypt SDK
      • uSMTP Toolkit
      • uMQTT Toolkit
      • uFile File Encryption
      • e802.1X SDK
      • uMODBUS Toolkit
      • EST SDK
      • NTP Client
      • uFTP Toolkit
      • Certstore Toolkit
  • Services
    • IoT Cybersecurity Trends
    • CDX Cloud Data Exchange
    • IoT Cybersecurity and the CRA
    • ESAS Embedded Software Assurance Service
    • Eclipse ThreadX Solution Center
    • Planning and Design
    • Solution Delivery
    • Product and System Integration
    • Product Life Cycle
  • Industry Partners
  • News
    • Upcoming Trade Shows
      • Past Trade Shows
    • Company Blog
    • News Releases
    • Product Announcements
    • Recent Newsletters
  • Support
    • Customer Area
    • Sitemap
    • Privacy Policy
    • Contact Us
You are here: Home / Cypherbridge Systems Verticals / Case Study: Mil/Aero

Case Study: Mil/Aero

Mil/Aero is undergoing a sea change as stand-alone embedded devices migrate to net-centric COTS devices, boards and systems, which calls for commercial security software that can keep pace.

Applications for COTS-based security software include everything from securing the end-points for peer-to-peer, client-to-server network communication to providing a secure interactive session for mobile operator over network. Others include packet-based tactical radios, secure machine-to-machine session, data transmission and file transfer; encryption of data in-flight and bulk-encryption of data at-rest for fixed and removable file systems.

SSL and SSH use well-proven asymmetric and symmetric encryption and hash algorithms, including AES, RSA, DSS, 3DES, Blowfish, SHA-1 to SHA-512 and X.509. These mission-critical algorithms establish a strong security model for in-flight and at-rest applications, and are well matched to COTS hardware and embedded operating systems.

An example SSH development platform is Cypherbridge’s uSSH Embedded SSH Server. This portable ANSI C SSH server lets developers implement secure interactive shell and SSH tunneled application functions using the uSSH solution. The server provides a secure telnet replacement and boasts a flexible TCP/IP security layer for existing and new applications using the built-in command dispatcher. The software is easy to integrate with run-time environment using RTOS integration features.

The uSSH SDK can be complied for a range of processors and platforms, and comes equipped with utilities and toolkits to manage user accounts and private keys. Build options include tailored asymmetric and symmetric crypto suite, login banner, account access control and other features. The compact uSSH protocols and fully integrated math and crypto library can be tailored to a very compact memory footprint under 50K on a typical Cortex-M3 flash MCU.

Contact Us

Cypherbridge Systems
7040 Avenida Encinas #104211
Carlsbad, CA 92011 USA

Phone: +1 760-814-1575
Email: info at cypherbridge.com

Follow Us

  • LinkedIn
  • Twitter
  • YouTube

About Us

Cypherbridge Systems is a security and communication protocol software firm based in Carlsbad, CA. Since inception in 2005, Cypherbridge has delivered a diverse range of solutions to real-world problems for vertical markets. Our customers range from venture funded startups to Fortune 10 global companies.

Learn More
Join the Cypherbridge Mailing List

We use MailChimp as our marketing automation platform. By clicking below to submit this form, you acknowledge that the information you provide will be transferred to MailChimp for processing in accordance with their privacy policy and terms.


Copyright © 2025 · Log in