IoT: Prepared for post-quantum security

IoT: Prepared for Post-Quantum Security - Image by Pete Linforth from Pixabay

Share post

Many companies are unprepared for the transition to post-quantum cryptography. Keyfactor aims to use PKI and cryptographic management to guide companies through the transition to post-quantum security, particularly in securing emerging IoT devices.

Keyfactor today announced the release of two product updates: EJBCA 8.0 and SignServer 6.0. The updates bring significant advances in IoT (Internet-of-Things) security and lay the foundations for post-quantum readiness, as many organizations see greater security needs and protection against cyberattacks in relation to recent developments in these areas.

New features of EJBCA 8.0

Preparing for Post-Quantum

Support for candidates for quantum-safe certificate issuance and signing algorithms, Dilithium and Falcon. The update allows organizations to test them and thus better prepare for the inevitable transition to post-quantum cryptography before the National Institute of Standards and Technology (NIST) completes standardization in 2024.

New IoT security features

A new modular extension of EJBCA, along with support for the Matter Smart Home standard, extends the powerful capabilities Keyfactor already offers today by making it even easier for manufacturers to deploy a Public Key Infrastructure (PKI) in production, at the edge, or in OT (Operational Technology) environments while meeting the needs of the industry.

Agile SSH certificate issuance

There's a new SSH Certificate Authority (CA) that enables a more agile and secure approach to creating trusted connections with machines. The new version can issue host and user SSH certificates, replacing static SSH keys and passwords that are difficult to manage and vulnerable to theft or misuse with secure short-lived SSH certificates.

Updates from Keyfactors SignServer 6.0

Post-Quantum Readiness

Support for code signing with the post-quantum algorithms Dilithium and SPHINCS+, both final NIST candidates, in testbeds that allow developers and product teams to perform a proof-of-concept for signing their code, applications, or firmware.

Advances in IoT security

With the update, device manufacturers can now digitally sign software and firmware with multiple signatures to ensure compatibility across devices while enhancing device security. The update also enables a seamless transition to post-quantum security for IoT devices, allowing firmware to be signed with production-ready algorithms today and post-quantum algorithms in the future.

More at Keyfactor.com

 


About key factors

Keyfactor brings digital trust to the hyper-connected world with identity-based security for people and machines. By simplifying PKI, automating certificate lifecycle management, and securing every device, workload, and object, Keyfactor helps organizations build rapidly scalable digital trust.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more