Is the Identity Market under attack from Quantum Computers?

In an era of unprecedented technological advancements, quantum computers stand as the harbinger of a revolutionary paradigm shift. As these powerful machines inch closer to reality, the impact they'll have on our digital world, especially in the realm of identity protection, cannot be understated. To delve into this pressing topic, we gathered a panel of esteemed experts for a roundtable discussion on quantum computers, post-quantum cryptography, and their profound effect on the identity market. In this gripping blog post, we present the compelling transcript of this enlightening conversation, as our experts shed light on the potential threats, opportunities, and transformative solutions that will shape the future of identity protection in a quantum-powered world. Join us on this journey of explor

Post Quantum Cryptography – What do YOU need to know?

In a world where technology is advancing at a breathtaking pace, the rise of quantum computing poses both a thrilling opportunity and a looming threat to our digital security. As quantum computers inch closer to reality, traditional cryptographic methods that have safeguarded our data for decades are now at risk of being compromised. Enter post-quantum cryptography, the key to fortifying our digital world against quantum attacks.

Infineon’s OPTIGA™ Trust M first to receive CLS-Ready certification from Cyber Security Agency of Singapore

OPTIGA™ Trust M from Infineon Technologies AG is the first security platform to receive the CLS-Ready certification from the Cyber Security Agency of Singapore (CSA). As the number of IoT devices increases, so does the number of cyberattacks worldwide. However, the security of Internet of Things (IoT) and Internet of Thinking Things (IoTT) devices is very…

Infineon accelerates research on post-quantum cryptography

Quantum computers have the potential to break cryptographic schemes like RSA and ECC* which are currently used for encrypting personal and sensitive data. Ultimately, the confidentiality of digital communication and data exchange in mobile communications, in the Internet of Things or in the public domain could be at threat. To tackle this massive challenge, leading…

A new German security architecture for next generation ID and IoT requirements

By Markus Hoffmeister & Klaus Schmeh, cryptovision GmbH. The Cryptographic Service Provider (CSP) module, based on an architecture developed by governmental cyber security experts in Germany, is an innovative and effective approach to implementing cryptographic security functions across a diverse array of sensitive applications. It takes security development to a new level, by enabling smooth…

IDEMIA launches enhanced security smart cards resistant to quantum computers

Asymmetric cryptosystems are at the heart of digital security as they are the cornerstone for the Public Key Infrastructure (PKI), as well as – amongst other things - secure authentication, digital Identities and trusted services. In particular, they are widely deployed in secure elements to perform safe authentication of people and things (IoT). Indeed, it…

%d bloggers like this: