Enterprise Integration Zone is brought to you in partnership with:

Mitch Pronschinske is the Lead Research Analyst at DZone. Researching and compiling content for DZone's research guides is his primary job. He likes to make his own ringtones, watches cartoons/anime, enjoys card and board games, and plays the accordion. Mitch is a DZone Zone Leader and has posted 2578 posts at DZone. You can read more from them at their website. View Full User Profile

Using ZeroMQ's New, Ironclad Security Features

09.16.2013
| 5109 views |
  • submit to reddit

Last week, Pieter Hintjens started writing a series on how to use new ZeroMQ security layers to build an application with "unbreakable strong security."  

The post is especially relevant in the wake of the chilling NSA discoveries this summer:

What the NSA can break today, any competitor or foreign intelligence service can break tomorrow. In our connected world, this throws a pool of ice cold water over the growth of low-friction Internet commerce.

-- Pieter Hinjens 


Here is the abridged list of ZeroMQ team's goals when creating the security layers:

  • It must be very simple to use, and impossible to get wrong.
  • It must be fast enough for real work.
  • It must be based on standardized protocols
  • It must have free and open source implementations
  • It must be free of patent risk
  • It must work with all ZeroMQ socket types
  • It must be built-in to the core libzmq library


Check out the full blog post to see how ZeroMQ works using strategies like Curve25519.