Virtual Smart Card: hassle-free authentication is here

Virtual Smart Card: hassle-free authentication is here

Atefeh Mokallah | Eviden Digital ID

“Hi there, I’m Ati, Product Manager for SCinterface, and I’d like to introduce you to a solution that’s revolutionizing secure access: SCinterface Virtual Smart Card (VSC).”

Imagine a world where managing credentials is simple and stress-free. Security should not be complicated. With SCinterface Virtual Smart Card (VSC), authentication becomes effortless. This solution consolidates all security needs into one robust platform. Now, you can navigate multifactor authentication with confidence and ease. Plus, you gain full control and peace of mind.

SCinterface VSC integrates physical, remote, and virtual smart cards. It also provides secure key storage and advanced cryptographic capabilities. As a result, organizations can stay ahead of evolving security threats. Additionally, it reduces costs, shortens delivery times, and ensures comprehensive protection. Whether for certificate-based authentication, SSO logins, digital signatures, decryption, or VPN connections, SCinterface VSC covers all bases.

The newest member of the family: SCinterface Virtual Smart Card

Switching to a Virtual Smart Card simplifies operations and enhances security. At the same time, it makes credential management easier. No more struggling with physical tokens. With SCinterface VSC, credentials remain securely stored on your device. This means authentication is seamless, whether you are at home, in the office, or on the go.

No matter your role, SCinterface VSC adapts to your needs. It delivers reliability, efficiency, and top-tier usability.

Curious to learn more?

Watch our webinar and see SCinterface VSC in action. We provide a live demonstration along with an in-depth look at its features. Learn how to simplify secure authentication for your organization today.

Iconic Mindshare: A cybersecurity summit redefining digital identity

Iconic Mindshare: A cybersecurity summit redefining digital identity

Mindshare 2024 once again solidified its reputation as a premier cybersecurity event, drawing over 400 delegates and guests from 16 countries. Held under the banner of “Your compass in the digital jungle,” the conference provided an engaging platform for thought leadership, networking, and technological advancements in the field of cybersecurity. Organized by Eviden Cyberproducts – Cryptovision, IDnomic Solutions, Trustway, and Evidian – the event successfully blended expert insights with business opportunities, making it a must-attend gathering for professionals in the cybersecurity domain.

A gathering of cybersecurity minds

The conference started with a relaxed pre-conference dinner. This set the stage for two days of intensive discussions, exhibitions, and presentations. Attendees included customers, partners, vendors, and industry leaders. The collaborative atmosphere encouraged knowledge sharing and business development.

One major highlight of Mindshare 2024 was its focus on key cybersecurity trends. These included the evolution of digital identity protection, quantum-resistant cryptography, and artificial intelligence in security protocols. With four dedicated tracks — Cryptography, Citizen ID, Sovereignty & Regulation, and Open Track — the conference covered a diverse range of topics. Experts from various domains found valuable insights.

Engaging speaker sessions and exhibitions

A key feature of Mindshare 2024 was its impressive lineup of speakers. Industry leaders shared insights on emerging threats, regulatory landscapes, and innovative security solutions. Delegates praised the “high-quality density of information” presented. Many highlighted the event as a crucial venue for staying updated on cybersecurity trends.

For sponsors and exhibitors, the conference offered exceptional exposure. They had the chance to showcase solutions to a highly targeted audience. Gold and Silver sponsors enjoyed dedicated exhibition spaces, speaker slots, and branding opportunities. Their presence extended across multiple touchpoints, including conference bags, email invitations, and on-site materials.

Networking and business development

Mindshare is well known for fostering meaningful business connections. The 2024 edition was no exception. Structured networking breaks, “Meet the Experts” sessions, and informal discussions kept engagement high. The famous Cryptonite Party added entertainment and social interactions, strengthening the community spirit that defines Mindshare.

For exhibitors, the event went beyond branding. One Gold Sponsor shared, “Our experience as an exhibitor at Mindshare 2024 was immensely beneficial. Engaging with diverse professionals has already led to new business opportunities.”

What’s next? Outlook for Mindshare 2025

Looking ahead, Mindshare 2025 aims to build upon past successes. Scheduled for September 10-11, 2025, in Gelsenkirchen, Germany, it promises even more insights, networking, and cybersecurity advancements.

The upcoming edition will explore post-quantum cryptography, AI-driven security frameworks, and evolving global regulations. Sponsorship opportunities remain highly sought-after. Presenting sponsors will receive exclusive visibility across marketing materials, speaker sessions, and branding placements.

Mindshare 2025 will continue to offer:

  • Comprehensive speaker sessions on cutting-edge security topics.
  • Enhanced exhibition spaces for maximum visibility.
  • Exclusive networking events, including the Pre-Conference Dinner and Cryptonite Party.
  • Dedicated tracks addressing industry challenges and regulatory changes.

With its mix of expertise, networking, and engaging discussions, Mindshare remains a must-attend event. As digital threats evolve, cybersecurity strategies must advance as well. Mindshare 2025 will be an essential platform for shaping the future of secure digital identities.

For those eager to stay ahead of cybersecurity trends, Mindshare 2025 is an event not to be missed. Mark your calendars and prepare for another groundbreaking conference that will define the next era of digital security.

Unsolved Encryption Mysteries: the mysterious postcard

Unsolved Encryption Mysteries: the mysterious postcard

Author: Klaus Schmeh, Eviden Digital Identity

Welcome to our new column, dedicated to unraveling unsolved encryption puzzles. Each month, we will present a different encrypted message that has thus far resisted all attempts at decryption. Today, we begin with a puzzling historical enigma: a cryptic postcard sent in 1873.

The Era of Encrypted Postcards

In the early 20th century, encrypted postcards were a common way to communicate secret messages, especially among young couples. With the telephone still not widespread, postcards were a popular means of correspondence, offering a quick way to send messages across distances. However, not everyone was comfortable with the idea of their private words being read by postmen or curious family members. As a result, many turned to encryption as a way to safeguard their secrets.
Though the majority of surviving encrypted postcards are relatively simple to decode today, one particular postcard has baffled cryptographers and historians for over a century.

Despite many attempts over the years, no one has yet succeeded in cracking the code on this postcard.

The mysterious postcard from George Furlong

This postcard, sent by football official George Furlong from Luton, England, to his sister Lizzie in 1873, has been the subject of numerous decryption attempts—none of which have been successful. The handwriting on the card is smooth and fluid, suggesting that the sender was proficient in this particular script. What makes this postcard especially intriguing is that no other examples of writing in this style have been found, leaving many questions unanswered.

The enigma of the message

What exactly is going on with this message? The postcard seems to be written in some form of cipher or a secret script, but it remains unclear whether this was an intentional encryption or simply a rare, obscure form of handwriting. Another question is whether the message is written in English or some other language—perhaps a code or dialect that has long since fallen out of use.

A particularly puzzling aspect of the postcard is the arrangement of certain letters, which appear stacked or layered on top of one another. What purpose could this serve? Was it simply a stylistic choice, or does it play a role in the encryption? Furthermore, was George Furlong trying to hide a deeply personal message, or was there another reason for his choice of writing? These questions remain unanswered, and the meaning of the card is still shrouded in mystery.

Can you help?

Despite many attempts over the years, no one has yet succeeded in cracking the code on this particular postcard. If you think you can help solve this puzzle, or if you have any thoughts on what might be behind this cryptic message, please get in touch.

Klaus´ Comments – PQC: More than a buzzword?

Klaus´ Comments – PQC: More than a buzzword?

IN THIS COLUMN, EVIDEN’S CRYPTOEXPERT

KLAUS SCHMEH COMMENTS ON CRYPTO STUFF

It’s no secret that quantum computers have the potential to break cryptographic algorithms such as RSA or Diffie-Hellman. However, the practical application of quantum computing is still far behind the theoretical capabilities. In order to pose a genuine threat to today’s cryptographic standards, a quantum computer would need to be able to factor prime products of 2048-bit length. Currently, quantum devices can handle no more than 5 bits.

Nevertheless, quantum computing technology is advancing. It’s not out of the question that one day, these machines will become powerful enough to compromise the cryptographic methods we rely on today. This moment, often referred to as Q-Day, will mark the arrival of practical quantum computers. But the critical question remains: when will Q-Day arrive?

No one can answer this question definitively. In fact, it’s still uncertain whether Q-Day will ever come to pass. However, key institutions such as the BSI (Germany), ANSSI (France), and NSA (USA) can’t afford to take risks. These organizations are already operating under the assumption that Q-Day might occur in about ten years.

Nevertheless, quantum computing technology is advancing. It’s not out of the question that one day, these machines will become powerful enough to compromise the cryptographic methods we rely on today. This moment, often referred to as Q-Day, will mark the arrival of practical quantum computers. But the critical question remains: when will Q-Day arrive?

No one can answer this question definitively. In fact, it’s still uncertain whether Q-Day will ever come to pass. However, key institutions such as the BSI (Germany), ANSSI (France), and NSA (USA) can’t afford to take risks. These organizations are already operating under the assumption that Q-Day might occur in about ten years.

This pessimistic working hypothesis will likely influence many laws and regulations in the coming years. Critical and sensitive IT systems will need to transition to quantum-resistant protocols within the next decade. For those interested in the current state of quantum computing, I highly recommend reading the BSI’s study on the topic

Fortunately, quantum-safe cryptographic methods—collectively known as Post-Quantum Cryptography (PQC)—already exist. The first PQC algorithms have been standardized, and more are expected in the near future. The next step involves integrating these new algorithms into existing protocols and formats—a process currently underway at full speed.

© www.bsi.bund.de

Cryptographic product manufacturers have also begun to respond, incorporating PQC algorithms into their offerings. But now, it’s up to businesses and government agencies operating security-critical IT systems to prepare for the transition to PQC. This means inventorying their cryptographic solutions and prioritizing necessary migration steps, with risk management playing a key role.

In my opinion, it’s crucial that businesses and public authorities begin planning for the post-quantum migration now. Delaying this effort will make it incredibly difficult to migrate essential IT systems within the next decade.

Klaus Schmeh | Eviden Digital ID

“It’s crucial that businesses and public authorities begin planning for the post-quantum migration now. Critical and sensitive IT systems will need to transition to quantum-resistant protocols within the next decade.”

Eviden Digital Identity

is an ideal partner in this transition. Our products already support some post-quantum algorithms, and we offer expert consulting services to guide you through the post-quantum migration.

In conclusion,

no one knows exactly what the quantum future holds. Quantum computers might still be far away, or they could become a reality within a decade. We can’t afford to adopt a “wait and see” attitude. Institutions like the BSI are already ensuring that laws will be adapted accordingly. Post-Quantum Cryptography is much more than a buzzword; it will become, and must become, the cornerstone of our IT security in the years to come.

Manifesting change in times of fear

Manifesting change in times of fear

 

Manifesting change in times of fear

The events that have taken place during 2020 seem to have put us all at great distance. The pandemic has shrouded the world in a fog of fears of death and illness. But it’s not just the disease itself, which causes hardship to people: coronavirus mitigation measures taken by rich countries to protect themselves, directly affect those less fortunate all over the world. Instead of isolating and turning inward to focus on our own challenges, let us take up the true spirit of the holiday season by being compassionate and let us cultivate a more balanced sense of responsibility for others and ourselves.

cryptovision is committed to manifesting this change. We have made charitable contributions to projects in affected regions, with a focus on our areas of business.

The cryptovision family would like to wish you and yours a joyous holiday season, a very happy New Year and all the best in 2021!