Story image

How Gemalto aims to ensure the future of IoT

26 Sep 2018

DigiCert, Gemalto, and ISARA announced a partnership to develop advanced quantum-safe certificates and secure key management for connected devices commonly referred to as the Internet of Things (IoT).

The partnership provides significant advantages for enterprise security teams looking to secure connected devices with lengthy product lifetimes now to avoid expensive security retrofitting as quantum computing becomes more prevalent. Organisations can deploy these solutions at any scale, given that DigiCert is already capable of issuing and reliably hosting billions of digital certificates for public trust and private PKI systems. 

The work of DigiCert with ISARA and Gemalto will enable quantum-resistant certificates with the full capability of hosted, on-premise and hybrid deployment options. DigiCert already works with many companies and consortiums using PKI to authenticate, encrypt and provide integrity for their connected devices. ISARA recognises DigiCert’s track record in advancing many of the certificate innovations in use today, as well as its robust certificate management capabilities, and in operating the industry’s most ubiquitous, trusted roots. 

Gemalto offers secure key storage and management via its SafeNet Hardware Security Modules (HSMs) that integrate with DigiCert APIs to enable large-scale, automated credential issuing for connected devices via an internet-enabled gateway to distribute identity over the cloud. Certificates obtained through this partnership will be enabled with quantum-safe cryptography ahead of any breakthroughs that could eventually lead to quantum computing threatening connected device security.

Today, many IoT devices rely on RSA and ECC cryptography to protect the confidentiality, integrity and authenticity of electronic communications. However, NIST and others in the security community predict that within a decade, large-scale quantum computing will break RSA and ECC public key cryptography. DigiCert, Gemalto and ISARA recognise that crypto-agility becomes paramount for manufacturers of connected devices that will be in use a decade or more from now. 

To advance the use of reliable quantum-proof certificates, DigiCert, Gemalto and ISARA are collaborating with industry standards bodies that also are pursuing the advancement of post-quantum cryptography such as the Internet Engineering Task Force (IETF). Efforts to address quantum computing security today will support connected device manufacturers and users well into the future. 

Consider the automobile industry, which is producing more vehicles with semi- and fully-autonomous driving capabilities. A car should last for 20 years or more, and manufacturers will need to ensure that the IoT devices they install will be secure and continue to function even if there is a breakage in the RSA algorithms that would render today’s digital certificates ineffective.

ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.