idw – Informationsdienst Wissenschaft

Nachrichten, Termine, Experten

Grafik: idw-Logo
Science Video Project
idw-Abo

idw-News App:

AppStore

Google Play Store



Instance:
Share on: 
03/20/2018 13:50

Next Generation Cryptography

Oliver Küch Presse- und Öffentlichkeitsarbeit
Fraunhofer-Institut für Sichere Informationstechnologie SIT

    Experts are warning: Cryptography must become more flexible in order to be able to react quickly to technical changes. If this does not happen soon, the cyber world could experience a security meltdown. The complete report is now available online at www.sit.fraunhofer.de/en/eberbach-crypto.

    Whether online-banking or blockchain – most IT security mechanisms for protecting data and digital communication are based on cryptography. Quantum computers and new forms of attacks are threatening many of these IT security mechanisms. How businesses and society can protect the cyber world from such devastating threats in the future was discussed by experts from business, research, and politics at the “Eberbacher Gespräch” on “Next Generation Cryptography”. The experts’ opinion: Cryptography must become more flexible in order to be able to react quickly to technical changes. If this does not happen soon, the cyber world could experience a security meltdown. Therefore, the experts recommend education on IT security, the development of practical help, as well as minimum EU-wide standards and an EU expert board for cryptography. The complete report is available online at www.sit.fraunhofer.de/en/eberbach-crypto.

    In today’s digitized and connected world, businesses and private citizens as well as politics and society see themselves confronted every day with challenges resulting from security vulnerabilities and threats via IT attacks. The industry is in an arms race with attackers trying to break cryptographic keys, protocols, and implementations. As a result, systems that are using cryptography have to be continuously improved and updated to withstand new attacks. Widespread cryptographic processes are continuously facing erosion: The increase in computing power of potential attackers is forcing us to adjust and strengthen security parameters permanently (e.g., the length of cryptographic keys), and to retire and replace outdated algorithms and protocols. In extreme cases individual cryptographic algorithms may be broken overnight.

    This ongoing race will be significantly impacted by the development of quantum computers. In comparison to classical computers, quantum computers shorten the time required for attacks on cryptographic algorithms substantially. So far, quantum computers have been primarily the subject of academic research, and the first commercial prototypes do not yet present an imminent threat to today’s cryptography. However, China and other countries are massively investing in the development of quantum computers so that it is only a matter of time until a sufficiently powerful quantum computer will dramatically change today’s cryptography. With the help of quantum computers, attackers will be able to render not only individual services and products insecure – they will be able to completely break cryptographic algorithms like RSA, DSA, DH, and ECC. Therefore, encrypted data and digital signatures protected by these algorithms will become vulnerable immediately. The consequences of this will affect individuals and companies as well as economy and society in general.

    Fraunhofer SIT invited IT security experts from business and science to an “Eberbacher Gespräch” on “Next Generation Cryptography” in order to discuss the upcoming challenges for IT security technology. The participants of this event proposed seven recommendations for business and policy makers: The experts recommend developing minimum standards for IT security solutions in business and industry in order to ensure more business IT security. Furthermore, a “Handbook for Cryptographic Solutions” should be provided to help making the development of secure IT products faster and easier. The USA is already standardizing cryptographic algorithms. Therefore, the experts are calling for EU decision makers to invest in the development of new cryptographic alternatives and to strategically address the support of agile cryptography in order to actively contribute to shaping the future technological map of the world. Furthermore, the European Union itself should develop standards for cryptography as well. Additionally, a board of crypto experts should be created that develops recommendations and counsels political representatives on questions of development and standardization. Finally, the general public must be sensitized to IT security questions and educated on the basics of cryptography.
    The complete paper is now available and can be downloaded for free here: www.sit.fraunhofer.de/en/eberbach-crypto


    Images

    Quantum computers and new forms of attacks are threatening many IT security mechanisms. If cryptography does not become more flexible the cyber world could experience a security meltdown.
    Quantum computers and new forms of attacks are threatening many IT security mechanisms. If cryptogra ...
    Fraunhofer SIT
    None


    Attachment
    attachment icon Full report of the Eberbacher Gespräch on Next Generation Cryptography

    Criteria of this press release:
    Journalists
    Economics / business administration, Information technology, Mathematics, Politics, Social studies
    transregional, national
    Research results, Transfer of Science or Research
    English


     

    Quantum computers and new forms of attacks are threatening many IT security mechanisms. If cryptography does not become more flexible the cyber world could experience a security meltdown.


    For download

    x

    Help

    Search / advanced search of the idw archives
    Combination of search terms

    You can combine search terms with and, or and/or not, e.g. Philo not logy.

    Brackets

    You can use brackets to separate combinations from each other, e.g. (Philo not logy) or (Psycho and logy).

    Phrases

    Coherent groups of words will be located as complete phrases if you put them into quotation marks, e.g. “Federal Republic of Germany”.

    Selection criteria

    You can also use the advanced search without entering search terms. It will then follow the criteria you have selected (e.g. country or subject area).

    If you have not selected any criteria in a given category, the entire category will be searched (e.g. all subject areas or all countries).