How can an organization migrate to post-quantum cryptography as smoothly as possible? At the MCTTP conference in Munich, Simon Ulmer and Klaus Schmeh from Eviden Digital Identity provided answers in an unusual way. Their presentation in science fiction design was one of the highlights of the event, which took place on September 18 and 19. The audience learned that, among other things, a crypto inventory and a risk assessment are necessary for a proper migration. The transition to post-quantum cryptography for smartcards and embedded systems will be particularly challenging.
Just one week after Mindshare Simon and Klaus showed once again that presentations by Eviden Digital Identity are pretty much anything but boring.
400 participants and guests, 33 talks, a fantastic party, and plenty of networking – that was Mindshare 2024, held on September 11th and 12th at the Gelsenkirchen Science Park. For all those who want to relive these two great days, and for all those who weren’t there, here is the official Mindshare video:
The U.S. National Institute of Standards and Technology (NIST) has officially designated three post-quantum cryptographic algorithms as national standards. These algorithms emerged as the top choices from a years-long global competition, with the winners initially announced in 2022. This decision represents a significant milestone toward ensuring security in the quantum era. Although NIST standards are technically binding only in the United States, they are likely to influence other countries, with key bodies like Germany’s Federal Office for Information Security (BSI) and France’s Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI) already expressing their support.
Along with standardization, NIST has introduced new names for the algorithms. CRYSTALS-Kyber will now be known as “ML-KEM” and assigned the identifier FIPS 203. Similarly, CRYSTALS-Dilithium has been renamed “ML-DSA” (FIPS 204), while SPHINCS+ will be called “SLH-DSA” (FIPS 205).
Eviden Digital Identity welcomes this significant advancement. With its crypto-agile product portfolio, which includes the cryptovision GreenShield email and file encryption solution and the IDnomic PKI solution, the company is well-positioned to support the new cryptographic methods. The three post-quantum algorithms in question have already undergone internal testing since 2022. With the recent standardization, these methods can now be implemented in a future-proof and interoperable manner.
However, the standardization process for post-quantum cryptography is far from complete. FALCON, another winner from the initial algorithm competition, is expected to be officially standardized this year under the name “FN-DSA” with the designation FIPS 206. Additionally, NIST is currently conducting another competition focused exclusively on digital signature methods, with the winners expected to be standardized in the coming years.
With 30,000 participants, DEF CON in Las Vegas is the largest hacker conference in the world. At this year’s edition (August 8-11), Klaus Schmeh, crypto specialist from Eviden Digital Identity, was represented with two presentations. His presentations, which he gave together with US crypto expert Elonka Dunin, focused on cracking various encryption methods and software programs that can be used for this purpose. Around 500 people attended each of the two presentations and, as always, Klaus Schmeh and his co-speaker’s vivid presentation style was extremely well received.
In the two days before DEF CON, the BSides conference also took place in Las Vegas, which addresses a similar target group, but is less commercially oriented and much smaller with 2000 participants. Klaus Schmeh and Elonka Dunin also gave a presentation at BSides. It was about modern computer algorithms that can be used to solve historically significant encryptions. Around 200 spectators watched the presentation, which featured numerous animations, and were captivated by the fascination of code-breaking.
Website of DEF CON: https://defcon.org/html/defcon-32/dc-32-index.html
Gunnar Preißler (Eviden Mission Critical Systems) and Klaus Schmeh (Eviden Digital Identity) will be presenting a solution for cryptographically securing communications in the rail sector at this year’s German IT Security Congress. This is a hardware component developed by Eviden in collaboration with Swedish supplier Westermo. The solution comprises a robust network device into which a security module in µSD format is integrated. This module performs the cryptographic functions and stores the keys. The security module can be replaced if necessary, without having to replace the entire component. Crypto-agility is thus assured.
The German IT Security Conference is organized by the Federal Office for Information Technology Security (BSI), and will take place this year on May 7 and 8 as an online event. Several thousand participants are expected. Gunnar Preißler and Klaus Schmeh will present on the first day at 11 a.m., just after the BSI keynote speeches. They are already looking forward to welcoming a large number of interested spectators.
We use cookies on our website. Some of them are functional, while others help us to evaluate page usage and thus improve our online offer. You can find out more in our privacy policy. Cookie SettingsAgreePrivacy Policy
Cookie Settings
Privacy Overview
This website uses cookies to improve your user experience while you are navigating the website. These cookies store the cookies categorized as required in your browser, since they are essential for the functioning of the basic functions of the website. We also use cookies from statistical tools, with which we can analyze and understand how you use this website. These cookies are only saved in your browser with your consent. You also have the option of deactivating these cookies. However, disabling some of these cookies can affect your browsing experience.
Necessary cookies are essential for the proper functioning of the website. This category only contains cookies that guarantee basic functions and security features of the website. These cookies do not store personal information. The necessary cookies also include the Polylang cookie, which is used to remember the language that the user selected when visiting the website again.