ePasslet Suite soon available on Infineon’s SECORA ID

ePasslet Suite soon available on Infineon’s SECORA ID

ePasslet Suite v3 – cryptovision’s Java card framework for electronic ID documents – will be available in 2020 on SECORA™ ID, Infineon’s new Java card operating system. Using ePasslet Suite, users of SECORA™ ID can easily and flexibly implement numerous eID functions. SECORA™ ID is the newest member of Infineon’s established SECORA family. SECORA™ ID is a smart card operating system based on the widely used Java Card standard. It was specifically developed as a platform for electronic ID cards.

SECORA™ ID is being certified according to Common Criteria EAL 6+ and EMVCo. In addition to Infineon’s in-house applet collection, SECORA™ ID also supports the proven ePasslet Suite by cryptovision. This solution considerably expands the functionality of SECORA™ ID by offering about a dozen additional applications. All common eID documents can be implemented this way, with a wide variety of configuration options as well as adaptations to national and project-specific requirements being possible – including electronic identity documents with several applications. The functionality includes the addition of applications on documents already issued. Cryptovision’s managing director Markus Hoffmeister: “We are delighted that Infineon customers can now use our suite on this new platform. The partnership with Infineon is another important milestone on our successful path in the eID market”. With Infineon’s SECORA™ ID as additional platform for ePasslet Suite, cryptovision gains access to another huge market: 70 percent of the worldwide population use identification documents based on Infineon’s security chips. To the Infineon press release

 

 

Cybersecurity everywhere, anytime

Cybersecurity everywhere, anytime

The EuropeanCyberSecurityMonth is in full swing. Again this year, in October, numerous companies and associations from all over Europe are participating in campaigns to raise awareness of cyber security. Private individuals and companies are sensitized to responsible behaviour in virtual space. Even today, IT security and encryption are still too often neglected. However, it is well known that the need for secure communication is rising rapidly.

With the increasing networking of people and things in everyday life (IoT), the degree of digitization only knows one course – it is growing exponentially. This also increases the demand for encryption concepts and intelligent solutions for secure digitization in almost all areas.

From discounters around the corner to security communication in the secret service – cryptovision GmbH solution concepts find an answer to the dangers of the digital world. This includes the technical security device (TSE) developed for Bundesdruckerei for cash register systems and the VS-NfD approved e-mail and file encryption software GreenShield: In Germany alone, sales tax fraud causes damage worth billions every year. The cryptovision GmbH with its TSE provides more security in the tax system – so that each tax paid by the customer at the cash register arrives at the intended places and does not disappear into private bags.

With the state certified VS-NfD E-Mail and file coding solution GreenShield, the cryptovision GmbH provides safe digital communication in secret protected authorities and enterprises.

Since its establishment in the year 1999 the cv cryptovision GmbH stands for user friendly cryptography solutions. With its well-balanced product range of electronic ID cards, e-mail and file encryption and fiscalisation solutions, cryptovision contributes significantly to the protection of digital identities and communication. The key to the application of security solutions lies in simplicity, user-friendliness and reliability. Therefore, the dynamic 60-person team of cryptovision GmbH is working hard this month to improve existing and develop new user-friendly encryption solutions in order to further optimize our proven products and create new solutions. And so we make – not only in October – our concrete contribution to the EuropeanCyberSecurityMonth!

 

Well done and well run: cryptovision at the B2Run in Gelsenkirchen

Well done and well run: cryptovision at the B2Run in Gelsenkirchen

cryptovision is a strong team. This applies not only to the company’s business fields, electronic identities and cryptography, but also to sporting challenges. For this reason, a cryptovision team took part in the company run (B2Run 2019) in Gelsenkirchen – for the third time in a row. With managing director Markus Hoffmeister as team leader, the run went on a 5.3 kilometer long course with a finish in the Gelsenkirchen soccer stadium. With typical cryptovision virtues, such as fighting spirit and stamina, all 12 cryptovision runners mastered the demanding course confidently, which was subsequently rewarded with medals. In the end, everyone agreed: It was great fun, and next year cryptovision will be at the start again.

B2Run Gelsenkirchen website

 

VS-NfD approval of BSI for GreenShield

VS-NfD approval of BSI for GreenShield

Good news for German authorities and companies in the field of VS: You can now use the GreenShield software to encrypt and exchange digital content that has been classified as VS-NfD. The Federal Office for Information Security (BSI) has approved Greenshield as the only software so far. The GreenShield components were developed in Germany according to BSI’s “VS requirement profile Secure transmission of e-mails and files”.

BSI President Arne Schönbohm emphasizes:

“Strong and correctly implemented encryption protects the confidentiality of any digital communication. By approving GreenShield, we help governments and businesses effectively protect the sharing of sensitive information. “

With GreenShield, emails and files can be encrypted, signed, and securely stored in their familiar workspaces. Used by the BSI for VS-NfD.

More about GreenShield

Markus Hoffmeister: Here’s what’s behind the Collection#1 hack

Markus Hoffmeister: Here’s what’s behind the Collection#1 hack

Have you checked to see if your password is one of the 21 million currently offered for sale on an illegal website under the name “Collection#1”? If not, you can do so on the website Have I been pwned?. If so, you may have to check again soon, as rumour has it that there will be more in the near future. As it seems, an unknown hacker has made rich loot here.

But how is such a gigantic password theft even possible? Quite simply: It is in the nature of a password that both sides must know it. So if an online provider has one million customers who log in with a password, that provider has to store one million passwords. In the current case, an employee with the appropriate rights or a hacker has gained access to stored passwords. Although there are ways to protect stored passwords, the current hack, as well as many others, show that these methods do not always work.

There are alternatives to passwords – especially the so-called two-factor authentication. For example, a transaction number (TAN) provided via a text message the customer needs to type in in addition to the password (M-TAN method) is a second factor. In this case, an attacker cannot use a stolen password because he doesn’t know the transaction number.

While the M-TAN method is widely used in online banking, you certainly would not want to access your emails in this way. This is why another form of two-factor authentication is often the better solution: two-factor authentication with a smartcard. This technique uses what is known as asymmetric cryptography, which makes it possible to check a type of password (here we are talking about a private key) without even knowing it. This “password” is usually stored on a smartcard. To log in, the user needs the smartcard in question and a secret number (PIN) to unlock it – two factors. A hacker or a corrupt IT employee has no chance from the outset. He can’t steal a password collection from the online provider because such a collection simply doesn’t exist. The provider can identify the user via the counterpart to the private key, the so-called public key.

Numerous companies and authorities have long since switched to two-factor authentication in the form described and thus abolished passwords. Online shops, email services and social media providers, on the other hand, usually shy away from the costs that arise when they equip their customers with smart cards. However, a loss of 21 million passwords (as in the current case) causes much greater damage. It is time for these providers to change their minds.

Markus Hoffmeister: Here’s what’s behind the Collection#1 hack

Markus Hoffmeister: Data theft could have been avoided

cryptovision CEO Markus Hoffmeister is not surprised about the recent data thefts German politicians and other celebrities fell victim to. His demand: Strong authentication and encryption must finally prevail among private users as well.

“Have the security systems of the Bundestag failed?” many a person asks with regards to the current reports on the leaked data of various politicians. In my opinion, the answer is no, because according to the current state of knowledge, the perpetrator(s) have not leveraged any security measures of the Bundestag (especially as celebrities who have nothing to do with the Bundestag are affected, too). Like other people, however, politicians are sometimes privately on the Internet and use social media, e-mail servers or cloud services. This is obviously where hackers have come in. Via stolen passwords, poorly secured access and other gaps, they have been able to access private data. This method is not new, but it still works, because Internet users tend to be carefree. Or as Frank Rieger from the Chaos Computer Club puts it: “As you can see, some of those affected have been relatively generous with their data.”

So what is to be done? In my opinion, the providers of e-mail, social media and cloud services are in demand. They need to ensure greater protection for end users. This is not rocket science but has long been an everyday occurrence in the professional sector. Many companies and authorities are currently switching from passwords to smart cards or other smart credentials – if they haven’t already done so. Encryption is also spreading more and more in this environment. It is high time that these standards from professional information technology also become a matter of course in private life. If necessary, the legislator must intervene and force the providers to take appropriate measures.

With its solutions (sc/interface for strong authentication as well as s/mail and GreenShield for mail and file encryption) cryptovision has proven for almost two decades that these security measures can be implemented in a user-friendly and practicable way. The current data theft therefore could have been avoided.