The problems and results of our research apply to the broader context of current and future challenges of the networked information society:
with functionality for authenticity, confidentiality, integrity, availability, privacy, and verifiability of communications.
Challenges within critical ICT-based infrastructure robustness, lawful communication interception and data retention, cryptanalysis, digital evidence and forensic investigation methods and techniques, privacy issues and ”Quis custodiet ipsos custodes?”
Challenges are: (i) identification, credentials, with applications including e-government and e-university services, (ii) electronic payments, digital cash, electronic and web commerce transactions, (iii) privacy, anonymity and traceability according to law such as digital health data.
Copyright, copy protection, conditional access, source identification. Challenges include digital rights mechanisms for multimedia content distribution, author/source attribution functions.
The data in transfer will surpass one Zettabyte (1021) per year at the end of 2014, and the data at rest is already more than 20 Zettabytes. The importance of Information Security and Cryptology is constantly increasing, and has become one of the crucial sustainability pillars of our modern civilization. By some researchers, the Zettabyte era has brought the new paradigm of Internet of Things (IoT) that is currently in the early phase of being The Botnet of Things, meaning the security mechanisms are still lacking behind the massiveness of the devices that are connected and sending, and receiving and storing data in insecure way.
Tweets by @StigMjolsnes