Post-quantum cryptography has a strong impact on Entrust Datacard’s main business areas:
on SSL, PKI, as well as on the authentication business.
One of the main challenges along the road to post-quantum cryptography is the plethora of unknown parameters. The post-quantum algorithms are not known yet, nor are any standards related to PQC defined. Knowledge leaders need to guide that way, and navigate their followers around the hurdles and hidden dangers.
Sandy Carielli faces all the unanswered questions, in her pursuit to guide Entrust Datacard’s partners and customers securely into the PQC-era
HSMs play an important role in this transition. They promise to really advance the cryptographic acceleration and performance requirements. Carielli also sees opportunities for HSMs in protecting stateful algorithms communicating between data centers in stateful use cases – a feature of utmost importance in scenarios of disaster recovery.
We at Utimaco have the honor to work with some of the leading researchers in quantum cryptography, who use our Hardware Security Modules.
The ultimate goal is to prepare:
In the context of Utimaco’s Applied Crypto Symposium we had the chance to interview 3 of the leading researchers, and to dive into their views and research agenda on post-quantum cryptography.
In a 2nd video post, Madjid Nakhjiri, Senior Principal Security Architect at the Samsung Strategy and Innovation Center builds on Michele’s statements and describes PQC from a major industry player’s point of view. Samsung is a major player in the global B2C communication and entertainment industry. Connected devices are key to their future evolution. How will they handle it.
In this third video, Sandy Carielli, Security Technologies Director at Entrust Datacard provides the perspective of a major security company. How can cards be made post-quantum proof and what may be their role in the post-quantum era.
The posts will be accompanied by discussions of NIST’s “semifinal” selection of post-quantum algorithms. The discussions will be led by security experts such as Peter Smirnoff, co-developer of the latest release of the GOST hash function or IT-journalist Terry Anton.
Be informed about the release of the next post-quantum related blogs and videos. Simply enroll to our info-mail with the subscription button on the top right.
Are you part of a research institute or department and interested in participating in our collaborative research programs, please contact us for additional information.