THE HISTORY OF ENCRYPTION
Encryption can be traced back to the hieroglyphics of ancient Egypt around 3000 B.C. Long-considered impossible to decipher, the discovery of the Rosetta stone was the key to breaking the code.
During the Middle Ages, growth in diplomatic activities increased the need to convey confidential information, giving rise to the famous Cipher of Mary Queen of Scots and many others.
With the advent of the Internet and the vast amount of confidential information now exchanged, encryption technologies have become part of everyday life for everybody.
|Learn more about the history of encryption|
|Document||Encryption and decryption – the never-ending battle||Read|
LEARN ABOUTPQC TOOLKIT
Quantum computing will shatter RSA/ECC encryption standards. It’s only a question of when. To stay ahead of the curve, we’re testing post-quantum cryptography in hybrid certificates to provide protection from both standard and quantum attacks.
Start testing post-quantum secure certificates today to keep your data safe tomorrow. DigiCert's post-quantum cryptographic (PQC) toolkit contains everything needed to create a hybrid TLS certificate. This hybrid certificate uses a post-quantum cryptographic algorithm paired with a classical cryptographic algorithm, allowing you to test the viability of deploying post-quantum hybrid TLS certificates while also maintaining backwards compatibility.
|Learn more about PQC TOOLKIT|
|Document||PQC Toolkit Setup Guide||Read|
LEARN ABOUTTHE IoT SECURITY CHALLENGE
Gartner predicts there will be 25 billion connected devices by 2021. This is an unprecedented number of smart devices - exceeding the number of cellphones and computers in the world today - which will enable new efficiencies, communication methods, and modes of commerce. New technologies also mean new threats to data security, users, and enterprises.
DigiCert's IoT Public Key Infrastruture (PKI) platform is a proven comprehensive solution purpose-built for IoT efficiency, automation, and high performance. DigiCert provides management capabilities and data security protection for smart devices, industrial sensors, manufacturing systems, and healthcare devices.
|Learn more about Digicert|
|Resource||Protect Thousands of Medical Devices in Minutes||Read|
|Resource||Security That's Ahead of the Curve||Read|
|Resource||Smarter Cities. More Intelligent IoT Security||Read|
|Resource||Encryption That Builds a Strong Foundation||Read|
TLS (Transport Layer Security)/SSL (Secure Sockets Layer) technology enables the world to engage in online communications and ecommerce with confidence. Without it, sensitive information such as credit card numbers and passwords travelling between the user and the destination server could be seen by another computer. Three types of validation method are used: DV (Domain Validation), OV (Organization Validation) and EV (Extended Validation), with EV certificates providing the maximum amount of trust to visitors.
Each TLS/SSL certificate consists of a key pair as well as verified identification information. When a web browser points to a secured website, the server shares the public key with the client to establish an encryption method and a unique session key. The client confirms that it recognizes and trusts the issuer of the certificate. This process begins a secure session that protects message privacy and message integrity.
TLS/SSL also provides assurance, as browsers use visual aids such as lock icons or a green bar to tell visitors that their connection is secured by a TLS/SSL certificate and that it is safe to transact.
RSA and ECC are currently standard encryption algorithms used in TLS/SSL certificates.
|Learn more about TLS/SSL|
|Document||Beginner's guide to TLS/SSL certificates||Read|
|Youtube||SSL Made Easy||View|
|Resource||The Role of Extended Validation Certificates||Read|
|Document||The Ultimate Guide to Certificate Management||Read|
CertCentral, DigiCert’s TLS/SSL certificate management platform, removes the complexity of manual time intensive certificate management tasks, endless spreadsheets and shadow IT. It closes the loop on certificate lifecycles, signalling a new age in certificate management through a single pane of glass, freeing up your time, for business innovation.
The platform streamlines certificate management and eases the burden on administrators by eliminating the need to manually track critical certificate details. With CertCentral, users can customize and automate all stages of TLS/SSL lifecycle management and other digital certificate types—all from an intuitive user interface.
Get the insights you need into every certificate, in every phase of the certificate lifecycle with DigiCert CertCentral.
|Learn more about CERTCENTRAL|
|Document||Why a Global Leader in Industrial Software chose CertCentral||Read|
|Resource||CertCentral Product Overview||View|
|Youtube||How to manage your entire certificate lifecycle in 60 seconds||View|
In the near future, experts such as NIST have stated that the public-key cryptography used today will be broken by large-scale quantum computers, putting privacy and security at risk. Connected devices are on the rise (25 billion by 2021), many of which will have a long life span and as such post-quantum computing (PQC) is going to be a crucial element to consider when securing them. Additionally, we have identified that securing business infrastructures against threats rooted in today’s technology is not enough; a good example of this are financial institutes with their growing user base and demand for higher security.
DigiCert is finalizing its product plan to release a solution which is capable of offering RSA-ECC (hybrid) and PQC algorithms as part of a hybrid X509 certificate. This will protect web servers and IoT devices against the threat that quantum computers are going to pose. Adding PQC to our solution is part of our commitment to take care of our customers and innovate to solve future security challenges.
|Learn more about DIGICERT|
|Resource||DigiCert on Quantum: National Academy of Sciences Report||View|
|News||DigiCert, Gemalto and ISARA Partner||View|
|Resource||DigiCert and Utimaco work on securing the future of IoT||View|
LEARN ABOUTDIGICERT LABS
DigiCert Labs is an initiative dedicated to researching and developing innovative solutions for security challenges.
In collaboration with leading university researchers and industry leaders, we are gaining data-based insights into solving some of the most pressing security challenges related to our core competencies of encryption, authentication, identity and data integrity.
DigiCert Labs takes two approaches; the first is providing grants to universities to support research into specific challenges related to emerging threats and also through partnership with other enterprise labs. The second approach involves providing large, anonymized datasets to help researchers address real-world use cases. As part of this work, we are contributing industry-specific expertise and resources to ensure advancements in cyber security technologies and practical solutions to common problems.
|Learn more about Digicert|
|Document||DigiCert Labs to Explore Categorizing IoT Devices Based on Security, Privacy Using AI and Pattern Recognition Technologies||View|
|Document||DigiCert and Utimaco work on securing the future of IoT from quantum computing threats through collaboration with Microsoft||View|
A common goal for most companies is to improve business agility. The ability to quickly adapt to market changes gives an organization a competitive advantage and can also prevent unnecessary loses.
Information is an organization’s lifeblood, and the information security department is responsible for establishing and maintaining secure connections between IT systems and all external devices. As a best practice encryption should always be used between diverse systems that have to interoperate.
Your organization should require encrypted links to protect the information in transit whether it is destined for internal or external systems. As the sheer number of connected devices continues to rise, becoming “crypto agile” is a key component of an organization’s business agility.
|Learn more about Crypto-Agility|
|Resource||How to Improve your Organization’s Crypto-Agility||View|