Everything you need to know as a beginner on the subject of post-quantum cryptography, explained in an understandable way on 24 pages, in a German and an English version – this is the concept of the new Atos whitepaper on the subject of post-quantum cryptography. It explains the most important algorithms in a clear manner, avoiding overly complicated mathematics. Since the year 2022 will go down in history as the one in which the standardization of post-quantum cryptography first took concrete shape, this aspect is also highlighted. And finally, the white paper addresses the challenges of the coming years. These include bringing the new methods into the existing chip architectures despite long keys and, in some cases, poorer performance. If you want to know more about these topics, you can download the Atos whitepaper on post-quantum cryptography here.
For more than a year cryptovision has been a part of the Atos family. For all those who want to know how the company has developed during this time, a special issue of the ID Security magazine “The Vault” has now been published. All articles in this magazine were written by Atos employees with cryptovision past. The special issue is available for download free of charge.
An interview with Benjamin Drisch, Senior Vice President Government ID, is not called “From hidden champion to global player” for nothing. In fact, cryptovision has developed from a small specialist into a leading international provider in the Government ID segment under the Atos umbrella. The previous Government-ID service portfolio has been expanded to include PKI solutions, a smart card operating system and hardware security modules (HSMs), while the opportunities for project implementation have increased significantly thanks to numerous new colleagues. And, of course, the globally active Atos sales force ensures that cryptovision now has much better access to its customers.
However, the cryptovision special edition of “The Vault” not only reports on cryptovision itself, but also on some exciting developments in the field of digital identities. Among other things, it is about Non-Fungible Tokens, how they are stolen and how this can be prevented – True Crime once again. Fido tokens and smartcard middleware also come up. Also worth reading is an interview with Holger Roessner, CEO of cryptovision partner Advanide.
Finally, there is something to smile about. Adam Ross, an expert in beer and digital identities, reports on an interesting point of contact between his two areas of expertise. Cryptovision says “Cheers” and hopes you enjoy reading!
Do you know CRYSTALS-Kyber? If not, you will certainly get to know this post-quantum encryption method soon, because it was declared one of four winners from an original 69 candidates by the US standardization authority NIST. The other three winners in this multi-year competition are the CRYSTALS-Dilithium, FALCON and SPHINCS+ post-quantum signature methods.
The background is that the asymmetric crypto methods used so far, including RSA and Diffie-Hellman, can be broken with quantum computers. Although usable quantum computers have so far only existed in science fiction, NIST wanted to respond to the looming threat at an early stage and therefore organized a competition in which methods considered to be quantum-safe were to be evaluated and some standardized at the end.
Experience shows that other standardization bodies around the world are adopting NIST’s crypto standards. The announcement of the first four winners – with a few more to follow – is therefore tantamount to a go-ahead, because after years of uncertainty, it is now foreseeable which post-quantum methods will prevail in practice. Crypto vendors around the world will now have to implement these methods, universities will have to change their curricula.
It won’t be easy for crypto enthusiasts, however, because there is higher mathematics behind post-quantum cryptography. While SPHINX+ is based on the comparatively easy-to-understand principle of one-way functions, CRYSTALS-Kyber, CRYSTALS-Dilithium and FALCON are mathematically much more sophisticated. All three belong to the so-called lattice methods and therefore require arithmetic operations in multi-hundred-dimensional lattices – not exactly what the average person learned in school.
Already for the tenth time cryptovision invited to Mindshare. After two years of Corona break, the two-day congress fair was awaited with particular excitement, and those who came to Gelsenkirchen were once again not disappointed.
In four tracks there were top-class presentations to follow, plus keynotes, live hacking, tutorials and panel discussions. In addition to the latest developments on eID, Internet of Things and email encryption, post-quantum cryptography and user-friendly security solutions were also discussed. Of course, cryptovision also provided information about its strategy following the acquisition by Atos, which offers fascinating new opportunities for customers of both companies.
For the first time, cryptovision also presented a Crypto Cave, where a real Enigma as well as other encryption machines could be marveled at. The Crypto Museum in Eindhoven provided these rare exhibits.
And of course the Mindshare wouldn’t be the Mindshare without the great Cryptonite party on the evening of the first conference day. Besides buffet, bar, live music and photo ball, fireworks were not to be missed.In this pleasant atmosphere there was ample opportunity for exchange of ideas and networking, which 450 participants did not miss.
For all those who missed the Mindshare and for all visitors who want to review the two days, cryptovision has published a video. In a good minute it faithfully reproduces the great Mindshare atmosphere:
The current version of the GreenShield security software has received formal approval from the German Federal Office for Information Security (BSI) for processing classified information up to VS-NfD. It was already known at the beginning of February, at the BSI IT Security Congress, that the new GreenShield version had successfully passed the technical evaluation at the BSI and that only the so-called “co-signing” had to be granted.
GreenShield supports both common standards – S/MIME and OpenPGP – and is characterized by very high user-friendliness, a decisive factor for authorities and the secrecy-conscious economy. With the current approval, GreenShield follows two previous versions, all of which also have VS-NfD approval.
For the first time, GreenShield receives both an approval with support for various smart cards (TCOS, CardOS, JCOP, etc) and an approval recommendation for use without a smart card. This makes GreenShield the solution of choice for anyone who wants to encrypt at a high level of security and/or replace the Chiasmus encryption program, whose VS-NfD approval expires at the end of June.
GreenShield website: https://www.cryptovision.com/en/products/secure-encryption/greenshield/
It is a collaboration that pays off for all parties involved: At the end of 2021, NXP has sold the hundred millionth chip with a license of cryptovision’s ePasslet Suite product.
The ePasslet Suite is a Java card framework for electronic ID documents. From electronic ID cards to electronic passports and signature cards, it can be used to quickly and easily implement almost any electronic identity document. The product is used in more than 30 projects in over 25 countries around the world.
cryptovision and the semiconductor manufacturer NXP® Semiconductors have been working together since 2010 to provide customers around the world with a secure platform for identity documents. The ePasslet suite framework is most commonly used on NXP’s Java Card operating system JCOP®. In addition, NXP offers the ePasslet Suite (under the name eDoc Suite) in its own product portfolio. Meanwhile, customers in Armenia, Ecuador, Ghana, Moldova, Nigeria, Rwanda, Sierra Leone, Uzbekistan and other countries are using this solution – as the number of licenses shows, with great success.
“The fact that we have now exceeded the 100 million mark with NXP proves on the one hand the high quality of the ePasslet Suite,” reports Rüdiger Horn of cryptovision. “On the other hand, the cooperation with NXP, its smart card chips and the Java card operating system JCOP is ideal to offer customers a proven platform for cryptovision’s ePasslet Suite.” Meanwhile, development continues: the new ePasslet Suite 4.0 version for JCOP 4.5, which has several new features, is expected to be available by the end of 2022.
cryptovision will be represented with two presentations at the renowned BSI congress next week. In both presentations GreenShield, cryptovision’s innovative email and file encryption solution, plays a central role. This is no coincidence, as GreenShield is currently in great demand.
In particular, Greenshield can be used to replace the encryption software Chiasmus, which has been in use for two decades. Its approval for data classified as VS-NfD was originally due to expire at the end of 2021, but the German Federal Office for Information Security (BSI) has now extended the deadline for the last time by six months.
According to the BSI’s replacement guide, there are only two products approved as Chiasmus successors in the VS-NfD environment – GreenShield is one of them. GreenShield supports S/MIME and PGP, both common standards for email encryption and signing. Both formats can also be used for files. When implementing this feature, the cryptovision developers placed great emphasis on user-friendliness. With success: Encryption or decryption requires – if at all – only a few mouse clicks, whereby the user does not have to deal with the two different standards and does not even have to know that they exist at all. If you want to know more about GreenShield’s sophisticated S/MIME-PGP integration, you can listen to the first of two cryptovision presentations at the BSI Congress on February 1 at 13:40. The speaker for this presentation, entitled “Processing PGP and S/MIME together”, is Dr. Matthias Edelhoff. Participation in the congress is free of charge.
Meanwhile, the introduction of GreenShield with automatic certificate management has started at a federal authority. This project is the topic of the second cryptovision presentation at the BSI Congress, which will also be held on February 1, at 14:05 – directly following the first one. The speaker is Martin Peeckhaus. Title of the presentation: “Email Security in an Environment with and without VS Requirements – A Case Study”.
The German IT Security Congress, hosted by the Federal Office for Information Security (BSI), has been an important industry gathering for decades. The lecture slots are highly coveted and are awarded by a high-ranking committee via anonymous peer reviews.
This year, cryptovision has managed to place two presentations in this top-class program: On February 1 at 13:40 Dr. Matthias Edelhoff will talk about ” Processing PGP and S/MIME together”. This will be directly followed by Martin Peeckhaus at 2:05 p.m. with the topic “E-mail security in an environment with and without VS requirements”. The complete congress program is available on the BSI website.
The event, also known as the “BSI Congress”, used to take place every two years. Due to the ever-increasing importance of this gathering, the BSI has now switched to an annual rotation. Unfortunately, the Corona pandemic prevents this year’s edition from being held in the usual form as a face-to-face event. Instead, participants can expect a virtual congress. Participation is free of charge.
The trade fair accompanying the congress will also be held virtually this year. Cryptovision will again be present with a booth. An overview of the exhibitors will soon be available on the BSI website. We are looking forward to your visit!
After last year’s Trustech in Cannes had fallen victim to the pandemic, it celebrated a comeback in the heart of Paris. cryptovision was also on site and – true to tradition – invited selected customers and partners to the famous Cryptonite party on the evening of December 1st. During a night cruise on the Seine, 100 hand-picked guests enjoyed champagne and petits fours in front of a fascinating backdrop. Participants came from Europe, Africa, North and South America. For the first time, they were also able to exchange ideas with top managers from the new cryptovision owner Atos.
The following video gives some impressions of this extraordinary event:
The African country Ghana has now been accepted into the ICAO Public Key Directory. Ghana has become the 79th nation listed. cryptovision has played a major role in the preparation of this achievement, providing both software solutions and consulting.
Since 2011, the International Civil Aviation Organization (ICAO) has been operating a database for which each authorized state provides a cryptographic key: the ICAO Public Key Directory (PKD). With the keys in this database, forged electronic identity documents can be easily detected. However, inclusion in the ICAO PKD is subject to strict conditions. In particular, the production and issuance of identity documents in the country concerned must meet high security requirements.
After Ghana fulfilled all these requirements, the ICAO included the country’s key in their PKD in mid-October. cryptovision is especially proud of this, as the Gelsenkirchen-based company has built the cryptographic infrastructure for the Ghanaian identity document (Ghana Card). For instance, the authority issuing digital certificates for the Ghana Card is operated with the cryptovision product CAmelot.
cryptovision’s client in Ghana is a public-private partnership consisting of the residents authority NIA and the Margins Group. Members of these two organizations will attend their first ICAO PKD Board meeting in Amsterdam from October 27-28.
cryptovision has been active in Africa for more than ten years and has carried out numerous projects there in the field of electronic identity documents. The inclusion of Ghana into the ICAO Public Key Directory shows again that cryptovision can build complex cryptographic solutions that meet stringent regulatory requirements.
Necessary cookies are essential for the proper functioning of the website. This category only contains cookies that guarantee basic functions and security features of the website. These cookies do not store personal information. The necessary cookies also include the Polylang cookie, which is used to remember the language that the user selected when visiting the website again.