Cryptoagility

Resilient systems with adaptable cryptography

The rapid development of quantum computers poses a threat to conventional encryption methods, necessitating a transition to quantum-resistant algorithms. ATHENE researchers analyse the challenges involved in switching to post-quantum cryptographic methods within various organisations, conducting comprehensive studies in the process. They support companies in practical implementation with a checklist for the technical implementation of cryptoagility. Their research shows that organisations can significantly improve their cryptographic adaptability by using modular system architectures and central decision-making bodies. Companies and authorities should invest in building knowledge and flexible cryptographic infrastructures today. These preventive measures enable a quick response when vulnerabilities are identified and guarantee the long-term security of digital communication.


ATHENE projects and contributions from its "Cryptoagility" think tank

„Kryptoagilität“: Impulse paper of the Wissenschaftliche Ar­beits­grup­pe Nationaler Cyber-Sicherheitsrat, November 2024
Authors: Thomas Caspers, Prof. Gabi Dreo Rodosek, Prof. Claudia Eckert, Prof. Jörn Müller-Quade, Prof. Christof Paar, Prof. Alexander Roßnagel, Prof. Michael Waidner
Download (PDF, 1,7 MB)

Slides „Krypto-Agilität“, 07.02.2024
Authors: Dr. Michael Kreutzer, Prof. Michael Waidner, Leonie Wolf
to the slides

Article in DuD • Datenschutz und Datensicherheit "Kryptoagilität“, Oktober 2024
Authors: Dr. Michael Kreutzer, Leonie Wolf, Prof. Dr. Michael Waidner
to the article (behind login)

Study „Krypto-Agilität - Leitfaden für langfristige IT-Sicherheit“, 2024
Author: Leonie Wolf
to the study

Checklist: „Technische Umsetzung von Krypto-Agilität“, 2024
to the checklist

Slides „Crypto agility spider chart“: Präsentation auf der CrossFyre22
Author: Leonie Wolf
to the slides

“Tracing Cryptographic Agility in Android and iOS Apps”, Paper presented at the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023
Authors: Kris Heid, Jens Heider, Matthias Ritscher, Jan-Peter Stotz
to the paper  

“Security code smells in apps: are we getting better?” Paper in: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Author: Dr. Steven Arzt
to the paper

“Post-quantum cryptography for electric vehicle charging”, Paper in: International Conference on Applied Cryptography and Network Security (pp. 85-111). Cham: Springer Nature Switzerland, May 2023
Autoren: Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen
to the paper

“Downgrading {DNSSEC}: How to Exploit Crypto Agility for Hijacking Signed Zones”, Paper presented at the 32nd USENIX Security Symposium 2023
Autor*innen: Elias Heftrig, Prof. Haya Schulmann, Prof. Michael Waidner
to the paper