Quantum Resistance

Quantum resistance refers to cryptographic algorithms designed to withstand potential code-breaking attempts by quantum computers. Unlike conventional algorithms, quantum-resistant ones use much larger key sizes to enhance their robustness against quantum computing attacks. Quantum computers have the potential to crack traditional encryption methods quickly due to their ability to perform millions of calculations simultaneously. Quantum-resistant cryptography, therefore, aims to prevent this by employing different mathematical approaches and larger key sizes.

Gimel ID will be improving its quantum resistance and prepare against quantum attacks, accordingly. We are reviewing and prioritizing actions regarding several levers:

  • Post-Quantum Cryptography (PQC): Preparing for introducing cryptographic algorithms that are resistant to quantum computing attacks. These algorithms use larger key sizes and different mathematical approaches to ensure security. 
  • Hybrid Encryption: Combining traditional cryptographic methods with modern algorithms to enhance security. For example, Gimel ID is being created as multi-layer hash.
  • Crypto-Agility: Ensuring systems and protocols are flexible enough to switch to quantum-resistant algorithms when they become available. Wherever possible, Gimel ID maintains the opportunity to replace algorithms und thus introduce new releases, e.g., when it comes to crypto-procedures and the re-creation of identities associated.
  • Protecting Long-Term Keys: Safeguarding cryptographic keys that will be used in the future, as quantum computers could potentially decrypt data encrypted with current keys. For this reason, we protect the details of our procedure for creating the Gimel ID.
  • Regular Security Updates: Continuously updating and patching systems to protect against emerging threats, including those posed by quantum computing. The Gimel ID team can be working together with security experts and advisors to review, update and even improve our premium-security protocol.

These measures will be crucial for maintaining data security and privacy of our Gimel ID, hosted by our Gimel Wallet* or Bespoke G-Wallet in the era of quantum computing.

 

Note: We are currently in the process of piloting our Bespoke G-Wallet solution for organizations. To customize your Bespoke G-Wallet and develop the suitable Gimel Governance for your organization, please contact us and get your workshop for free. Contact Arrow

We are happy to discuss and customize our implementation approach as well as proposal with you. Pilot projects for implementation Arrow

Further services such as our Gimel Wallet and the Gimel ID API, which are marked with an Asterisk (*) on our website, are work in process and coming soon. Please feel free to register now and we will be coming back as per the earliest convenience. Register Arrow

For the terms and conditions of using our solutions, please see our end user license agreement of our Gimel ID website. Terms of use Arrow