This page is fully or partially automatically translated.

  • Product Presentation
  • Technik I
  • Websecurity/VPN
  • Network Security / Patch Management

Quantum resistant protection of products

Quantum computers could break our cryptography. Here the chances and problems of quantum resistant processes in products are explained.

10/8/2020 1:00:00 PM – 10/8/2020 1:15:00 PM

Please log in or register in advance so that you can take part in actions or watch videos about the action!

This action is available to the it-sa 365 community as a video.

  • Webinar
  • Technik II

Quantum computers could break our cryptography. Here the chances and problems of quantum resistant processes in products are explained.

Language: German

Questions and Answers: Yes

Video Thumbnail
close

This video is available to the it-sa 365 community. Please register or log in with your login data.

Action description

Quantum computers could one day weaken or even break the cryptographic methods we use today, thereby destroying secure communication. There are already numerous activities in the field of quantum resistant cryptography. But the way to a secure infrastructure is still a long way off. New procedures have to be checked in detail regarding their security. Their practical suitability can not only be determined theoretically, but must also be tested in real scenarios. Suitable procedures must be standardized and integrated into existing communication protocols. They can then take the first steps into practice via software implementations. However, this process can take many years, while state actors are already storing massive amounts of encrypted data traffic, only to break it years later. So we are already facing a conflict of acute need for action and limited options to secure all IT infrastructure for the future as quickly as possible. In the lecture chances, but also problems in the integration of quantum resistant cryptography in products and applications will be explained and it will be explained which measures can be taken already today or in the near future, for example, regarding the protection of software updates or virtual private networks.

read more

Speaker