Proposal(s) title:
- Developing ISO/IEC 29128 parts 2 and 3
Proposal(s) topic:
Cybersecurity/Network and Information security
Impact on SMEs:
Impact on SMEs (4th Open Call)
Ensuring that protocols are rigorously verified according to standardised methodologies could, at least partly, lower the financial barriers for SMEs to enter the certification market, as the consistent and reliable verification of protocols would streamline the certification of more complex systems.
Impact on society:
Impact on society (4th Open Call)
My work is centred on creating robust frameworks for verifying cryptographic protocols within ICT products, services, and processes, ultimately strengthening resilience against cyber threats.
Proposal(s) title:
- Progressing ISO/IEC 29128 parts 2 and 3
Proposal(s) topic:
Cybersecurity/Network and Information security
Impact on SMEs:
Impact on SMEs (5th Open Call)
By implementing rigorous, standardized verification methods, the overall efficiency of the certification process would improve. This would, to some extent, lower financial entry barriers for SMEs in the certification market, as consistent and dependable protocol verification would simplify the certification of more intricate systems.
Impact on society:
Impact on society (5th Open Call)
In the broader European context, my fellowship is poised to have a significant impact on cybersecurity practices, aligning with the objectives set forth by the Cybersecurity Act (CSA) and advancing European interests in bolstering digital security.
Proposal(s) title:
- Advancing ISO/IEC 29128 parts 2 and 3
Proposal(s) topic:
Impact on SMEs:
Impact on SMEs (6th Open Call)
A unified approach to the verification of cryptographic protocols within cybersecurity certification schemes could significantly reduce the costs and workload associated with certifying composite products or services. By ensuring that protocols are rigorously verified using standardized methodologies, the overall efficiency of the certification process would improve. This could, at least in part, lower the financial barriers for SMEs to enter the certification market, as consistent and reliable verification of protocols would streamline the certification of more complex systems.
Impact on society:
Impact on society (6th Open Call)
My primary focus is on developing standardized verification methodologies for cryptographic protocols, which play a key role in enhancing cybersecurity practices across Europe. I am working on creating robust frameworks for verifying these protocols within ICT products, services, and processes, ultimately contributing to greater resilience against cyber threats.
The Cybersecurity Act (CSA) promotes the use of certification as an effective cybersecurity tool that can be applied consistently across Member States without creating unnecessary administrative burdens. Previously, products or services certified in one country often had to undergo similar procedures again when different national requirements were in place.
With the introduction of the European Cybersecurity Certification (EUCC) scheme, however, certificates issued under this framework will be legally recognized across all Member States once the corresponding Implementing Act is in force. This harmonization is essential for reducing duplicated efforts, saving time and resources, and ensuring consistent cybersecurity standards throughout Europe.
The Cybersecurity Act (CSA) promotes the use of certification as an effective cybersecurity tool that can be applied consistently across Member States without creating unnecessary administrative burdens. Previously, products or services certified in one country often had to undergo similar procedures again when different national requirements were in place.
With the introduction of the European Cybersecurity Certification (EUCC) scheme, however, certificates issued under this framework will be legally recognized across all Member States once the corresponding Implementing Act is in force. This harmonization is essential for reducing duplicated efforts, saving time and resources, and ensuring consistent cybersecurity standards throughout Europe.
Value of Research
My work aims to develop robust frameworks for the verification of cryptographic protocols within the security of ICT products, services, and processes, thereby enhancing resilience against cyber threats.

Full Name: Daniel Waszkiewicz
Title & Organisation Name: Cryptography specialist, National Institute of Telecommunications
Country: Poland
Title & Organisation Name: Cryptography specialist, National Institute of Telecommunications
Country: Poland
Standards Development Organisation: