Sessions » Identity at the edge

Identity at the edge



Mountbatten Room
Wednesday 27 June

 
11.05
Introduction


11.10
The rise of biometric smart cards for the ID card industry
Antonio D’Albore, Editor in Chief, Embedded Security News, Italy

What is a biometric smart card and how can they be implemented to create a unique link between an ID Card and its rightful owner?

  • The rise of biometric smart cards;
  • Biometric cards in the secure ID industry;
  • Manufacturing challenges.


11.30
Post-quantum cryptography: challenges and opportunities for ID documents
Thomas Poeppelmann, Researcher, Infineon Technologies, Germany

Due to their computing power, quantum computers have the disruptive potential to break various currently used encryption algorithms. Quantum computer attacks on today’s cryptography are expected to become reality within the next 15 to 20 years. Once available, quantum computers could solve certain calculations much faster than today’s computers, threatening even the best currently known security algorithms such as RSA and ECC, which are used in all kinds of electronic ID documents. 

The solution is post-quantum cryptography (PQC) for security technologies. PQC should provide a level of security that is comparable with what RSA and ECC provide today. However, to withstand quantum calculation power, key lengths need to be longer than the usual 2048 bits of RSA or the 256 bits of ECC. Starting now, we need to ensure that an appropriate security technology is available and commercially feasible by the time quantum computers arrive. In the first part of his presentation, Thomas Poeppelmann will elaborate on the principles of post-quantum cryptography. The second part of his speech will focus on the specific consequences for ID documents, as well as the first practical implementations of PQC on security controllers.

  • Quantum computers have the disruptive potential to break various currently used encryption algorithms such as RSA and ECC;
  • The solution is post-quantum cryptography (PQC) for security technologies;
  • We need to ensure that an appropriate security technology is available by the time quantum computers arrive.



11.50
Details coming soon


12.10
Questions and answers

 


Share this page :
Follow us on :

Title Sponsor


See more

Premier Sponsors


See more

Sponsors


See more

Strategic & Premier Partners


See more

Media Partners


See more

Supporting Associations


See more