This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365: Header Desktop genua
Launch Days Technology I

Quantum resistant protection of products

Quantum computers could break our cryptography. Here the chances and problems of quantum resistant processes in products are explained.

calendar_today Thu, 08.10.2020, 13:00 - 13:15

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Websecurity / VPN Network Security / Patch Management

Organizer

Event

This action is part of the event Launch Days

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Quantum computers could one day weaken or even break the cryptographic methods we use today, thereby destroying secure communication. There are already numerous activities in the field of quantum resistant cryptography. But the way to a secure infrastructure is still a long way off. New procedures have to be checked in detail regarding their security. Their practical suitability can not only be determined theoretically, but must also be tested in real scenarios. Suitable procedures must be standardized and integrated into existing communication protocols. They can then take the first steps into practice via software implementations. However, this process can take many years, while state actors are already storing massive amounts of encrypted data traffic, only to break it years later. So we are already facing a conflict of acute need for action and limited options to secure all IT infrastructure for the future as quickly as possible. In the lecture chances, but also problems in the integration of quantum resistant cryptography in products and applications will be explained and it will be explained which measures can be taken already today or in the near future, for example, regarding the protection of software updates or virtual private networks. ... read more

Language: German

Questions and Answers: Yes

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.