IDnomic CMS 6.0 Released

IDnomic CMS 6.0 Released

Faster deployment with a web-based client, greater ease of use with a brand new end user UI, reduced resource consumption, and several modernized features – these are the key advantages of IDnomic CMS 6.0, the latest release of Eviden Digital Identity’s Credential Management System.

With nearly two decades of proven reliability, IDnomic CMS is an established web-based solution for managing credentials across a variety of secure devices, including tokens, smart cards, mobile devices, and TPMs (virtual smart cards). Its versatility makes it the ideal choice to adapt to both enterprises and public institutions scenarii. Supporting a wide range of enrollment processes, IDnomic CMS is fully compatible with all major smart chip vendors  a wide range of smart cards, tokens, middlewares and PKI solutions.

IDnomic CMS version 6.0 introduces significant improvements in  user-friendliness, ease of deployment, and resource efficiency. This update brings modernized autonomous workflows, including self-enrollment, self-recovery, self-revocation, and self-renewal. Additionally, IDnomic CMS 6.0 integrates cryptovision SCinterface middleware and supports both the cryptovision VSC (virtual smart card solution) and the cryptovision Pendragon PKI client.

“With this new version of our CMS, we further solidify our leadership in the secure identity market,” says Alexandre May, CMS Product Manager at Eviden Digital Identity. “Combined with our comprehensive suite of PKI and credential management solutions, IDnomic CMS offers a unique, integrated product portfolio that addresses the full spectrum of secure identity challenges our customers face”.

IDnomic CMS website: https://www.cryptovision.com/en/products/credential-management/idnomic-cms/

 

Eviden presentation on post-quantum migration at the MCTTP in Munich

Eviden presentation on post-quantum migration at the MCTTP in Munich

How can an organization migrate to post-quantum cryptography as smoothly as possible? At the MCTTP conference in Munich, Simon Ulmer and Klaus Schmeh from Eviden Digital Identity provided answers in an unusual way. Their presentation in science fiction design was one of the highlights of the event, which took place on September 18 and 19. The audience learned that, among other things, a crypto inventory and a risk assessment are necessary for a proper migration. The transition to post-quantum cryptography for smartcards and embedded systems will be particularly challenging.

Just one week after Mindshare Simon and Klaus showed once again that presentations by Eviden Digital Identity are pretty much anything but boring.

MCTTP website: https://www.mcttp.de/

 

Three post-quantum algorithms are now official US standards

Three post-quantum algorithms are now official US standards

The U.S. National Institute of Standards and Technology (NIST) has officially designated three post-quantum cryptographic algorithms as national standards. These algorithms emerged as the top choices from a years-long global competition, with the winners initially announced in 2022. This decision represents a significant milestone toward ensuring security in the quantum era. Although NIST standards are technically binding only in the United States, they are likely to influence other countries, with key bodies like Germany’s Federal Office for Information Security (BSI) and France’s Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI) already expressing their support.

Along with standardization, NIST has introduced new names for the algorithms. CRYSTALS-Kyber will now be known as “ML-KEM” and assigned the identifier FIPS 203. Similarly, CRYSTALS-Dilithium has been renamed “ML-DSA” (FIPS 204), while SPHINCS+ will be called “SLH-DSA” (FIPS 205).

Eviden Digital Identity welcomes this significant advancement. With its crypto-agile product portfolio, which includes the cryptovision GreenShield email and file encryption solution and the IDnomic PKI solution, the company is well-positioned to support the new cryptographic methods. The three post-quantum algorithms in question have already undergone internal testing since 2022. With the recent standardization, these methods can now be implemented in a future-proof and interoperable manner.

However, the standardization process for post-quantum cryptography is far from complete. FALCON, another winner from the initial algorithm competition, is expected to be officially standardized this year under the name “FN-DSA” with the designation FIPS 206. Additionally, NIST is currently conducting another competition focused exclusively on digital signature methods, with the winners expected to be standardized in the coming years.

NIST web page on post-quantum cryptography: https://csrc.nist.gov/projects/post-quantum-cryptography

 

Klaus Schmeh from Eviden presents at the world’s largest hacker conference

Klaus Schmeh from Eviden presents at the world’s largest hacker conference

With 30,000 participants, DEF CON in Las Vegas is the largest hacker conference in the world. At this year’s edition (August 8-11), Klaus Schmeh, crypto specialist from Eviden Digital Identity, was represented with two presentations. His presentations, which he gave together with US crypto expert Elonka Dunin, focused on cracking various encryption methods and software programs that can be used for this purpose. Around 500 people attended each of the two presentations and, as always, Klaus Schmeh and his co-speaker’s vivid presentation style was extremely well received.

In the two days before DEF CON, the BSides conference also took place in Las Vegas, which addresses a similar target group, but is less commercially oriented and much smaller with 2000 participants. Klaus Schmeh and Elonka Dunin also gave a presentation at BSides. It was about modern computer algorithms that can be used to solve historically significant encryptions. Around 200 spectators watched the presentation, which featured numerous animations, and were captivated by the fascination of code-breaking.

Website of DEF CON: https://defcon.org/html/defcon-32/dc-32-index.html