- Second edition of Rec. ITU-T X.510 | ISO/IEC 9594-11
Cybersecurity/Network and Information security
- Key Management and Public-key infrastructure: Establishment and maintenance
Cybersecurity/Network and Information security
- Role-based access control for electric power systems
- IEC 62351-90-4, Migration of cryptographic algorithms
Cybersecurity/Network and Information security
The involved standards are useful so that Europe is involved in this type of cybersecurity, which may affect future EU directives.
Every aspect of cybersecurity has a high priority. Access control needs to be timely in place to prevent unauthorised access.
- Revision of ITU-T X.510 | ISO/IEC 9594-11
Cybersecurity/Network and Information security
This updated standard will allow users (relying parties) to access certificate information for the whole of Europe and be a significant contributor to the single market. The two priorities selected are cybersecurity and interoperability. The whole scope of DPKI and the proposed access secure protocols are primarily related to cybersecurity. The proposed access protocol will use robust and trusted cryptographic algorithms to protect the protocols. It is prepared for migration to quantum resistant cryptographic algorithms (crypto agility). In parallel, any communication protocol is designed for interoperability and the two proposed protocols are no exception. Interoperability is a necessity.
- Third edition of Rec. ITU-T X.510 | ISO/IEC 9594-11, Protocol specifications for secure operations
The extended ITU-T X.510 | ISO/IEC 9594-11 is expected to be an important specification for cryptographic algorithm migration which is essential in the light of future developments of quantum computers. The cryptographic pluck-in capabilities are also important as they will ease migration, and they will allow different areas of the world to have their own choice of cryptographic algorithms.Moreover, this standard provideslean protocols with a minimum of overhead providing cybersecurity to other protocols (security by simplifications). This in particular important for constrained devices, like IoT devices.
Value of Research
Role: moderator
Title & Organisation Name: Independent Expert, Andersen's L-Service
Country: Denmark

