Enterprise Integration Zone is brought to you in partnership with:

Mitch Pronschinske is a Senior Content Analyst at DZone. That means he writes and searches for the finest developer content in the land so that you don't have to. He often eats peanut butter and bananas, likes to make his own ringtones, enjoys card and board games, and is married to an underwear model. Mitch is a DZone Zone Leader and has posted 2574 posts at DZone. You can read more from them at their website. View Full User Profile

Using ZeroMQ's New, Ironclad Security Features

09.16.2013
| 4889 views |
  • submit to reddit

Last week, Pieter Hintjens started writing a series on how to use new ZeroMQ security layers to build an application with "unbreakable strong security."  

The post is especially relevant in the wake of the chilling NSA discoveries this summer:

What the NSA can break today, any competitor or foreign intelligence service can break tomorrow. In our connected world, this throws a pool of ice cold water over the growth of low-friction Internet commerce.

-- Pieter Hinjens 


Here is the abridged list of ZeroMQ team's goals when creating the security layers:

  • It must be very simple to use, and impossible to get wrong.
  • It must be fast enough for real work.
  • It must be based on standardized protocols
  • It must have free and open source implementations
  • It must be free of patent risk
  • It must work with all ZeroMQ socket types
  • It must be built-in to the core libzmq library


Check out the full blog post to see how ZeroMQ works using strategies like Curve25519.