Erik Andersen
Description of Activities
The number of devices in these areas vastly outnumbers the number of human beings and this area is almost unprotected, which could have detrimental effects on our society. It is the hope that the project could be one way to enable a broader cybersecurity protection.
Fellow's country
Open Call Topics
Impact on SMEs (4th Open Call)
The involved standards are useful so that Europe is involved in this type of cybersecurity, which may affect future EU directives.
Impact on SMEs (8th Open Call)
The extended ITU-T X.510 | ISO/IEC 9594-11 is expected to be an important specification for cryptographic algorithm migration which is essential in the light of future developments of quantum computers. The cryptographic pluck-in capabilities are also important as they will
ease migration, and they will allow different areas of the world to have their own choice of cryptographic algorithms.Moreover, this standard provideslean protocols with a minimum of overhead providing cybersecurity to other protocols (security by simplifications). This in particular important for constrained devices, like IoT devices.
ease migration, and they will allow different areas of the world to have their own choice of cryptographic algorithms.Moreover, this standard provideslean protocols with a minimum of overhead providing cybersecurity to other protocols (security by simplifications). This in particular important for constrained devices, like IoT devices.
Impact on society (4th Open Call)
Every aspect of cybersecurity has a high priority. Access control needs to be timely in place to prevent unauthorised access.
Impact on society (6th Open Call)
This updated standard will allow users (relying parties) to access certificate information for the whole of Europe and be a significant contributor to the single market. The two priorities selected are cybersecurity and interoperability.
The whole scope of DPKI and the proposed access secure protocols are primarily related to cybersecurity. The proposed access protocol will use robust and trusted cryptographic algorithms to protect the protocols. It is prepared for migration to quantum resistant cryptographic algorithms (crypto agility).
In parallel, any communication protocol is designed for interoperability and the two proposed protocols are no exception. Interoperability is a necessity.
The whole scope of DPKI and the proposed access secure protocols are primarily related to cybersecurity. The proposed access protocol will use robust and trusted cryptographic algorithms to protect the protocols. It is prepared for migration to quantum resistant cryptographic algorithms (crypto agility).
In parallel, any communication protocol is designed for interoperability and the two proposed protocols are no exception. Interoperability is a necessity.
Linkedin Profile
Organisation type
Organization
Independent Expert, Andersen's L-Service
Portrait Picture
Proposal Title (1st Open Call)
Second edition of Rec. ITU-T X.510 | ISO/IEC 9594-11
Proposal Title (2nd Open Call)
Key Management and Public-key infrastructure: Establishment and maintenance
Proposal Title (4th Open Call)
Role-based access control for electric power systems
IEC 62351-90-4, Migration of cryptographic algorithms
Proposal Title (6th Open Call)
Revision of ITU-T X.510 | ISO/IEC 9594-11
Proposal Title (8th Open Call)
Third edition of Rec. ITU-T X.510 | ISO/IEC 9594-11, Protocol specifications for secure operations
Role in SDO
StandICT.eu Year
2026
Topic (1st Open Call)
Topic (2nd Open Call)
Topic (4th Open Call)
Topic (6th Open Call)