Four related algorithms are now ready for use to protect data created and transmitted by the Internet of Things and other electronics.