¡Ø º» »óÇ°Àº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.
eIDAS(ÀüÀÚ ID¡¤ÀÎÁõ¡¤Æ®·¯½ºÆ® ¼ºñ½º)¿¡¼ ¾çÀÚÀÇ ¿µÇâÀ» Á¶»çÇßÀ¸¸ç, eIDAS ½ÃÀåÀÇ ÇöȲ, Æ÷½ºÆ® ¾çÀÚ(PQ) ÀúÇ×ÀÇ ¿µÇâ, eIDAS ¸ñÇ¥¿¡ ´ëÇÑ À§Çù°ú ´ëÃ¥, ¾ÏÈ£ ¹Îø¼º¿¡ °üÇÑ ºÐ¼®, ÁÖ¿ä ±â¾÷°ú ¿¡ÄڽýºÅÛ, º¥´õ 9»çÀÇ ºÐ¼® µîÀ» Á¤¸®ÇÏ¿© ÀüÇص帳´Ï´Ù.
½Ç¿ëÀûÀÎ ÀÌÁ¡ :
- eIDAS(ÀüÀÚ ID¡¤ÀÎÁõ¡¤Æ®·¯½ºÆ® ¼ºñ½º) ½ÃÀåÀÇ ÇöȲ°ú Æ÷½ºÆ® ¾çÀÚ(PQ) ÀúÇ×ÀÌ ½ÃÀå¿¡ ¹ÌÄ¡´Â ¿µÇâÀ» ÀÌÇØÇÒ ¼ö ÀÖ½À´Ï´Ù
- eIDAS ¸ñÇ¥¿¡ ´ëÇÑ À§Çù°ú ÀÌ¿¡ ´ëºñÇϱâ À§ÇØ ½ÇÇàÇØ¾ß ÇÒ ¿ÏÈ Á¶Ä¡¸¦ ½Äº°ÇÒ ¼ö ÀÖ½À´Ï´Ù.
- ½ÃÀåÀÇ ÁÖ¿ä °úÁ¦¿Í º¥´õ°¡ Â÷º°ÈÇÒ ¼ö ÀÖ´Â ±âȸ¸¦ ÆľÇÇÒ ¼ö ÀÖ½À´Ï´Ù.
Áß¿äÇÑ Áú¹®¿¡ ´ëÇÑ ´äº¯ :
- eIDASÀÇ ¾î¶² ºÐ¾ß°¡ PQÀÇ ¿µÇâÀ» ¹Þ´Â°¡?
- PQ´Â ±¸ÇöÀÇ Áö¿ªÀû Â÷À̸¦ ¾ÇȽÃÅ°°í »óÈ£ ¿î¿ë¼ºÀ» À§ÇùÇϴ°¡?
- Áö±Ý ¾î¶² º¸È£ Á¶Ä¡¸¦ ÃëÇØ¾ß Çϴ°¡?
Á¶»ç ÇÏÀ̶óÀÌÆ®:
- eIDASÀÇ ±ÔÁ¦ ¸ñÇ¥¿¡ ºÎÇÕÇÏ´Â ÁÖ¿ä Á¶»ç °á°ú ¹× Àü¸Á
- ÁÖ¿ä ±â¾÷ ¹× »ýÅ°è, ½ÃÀå ³» 9°³ º¥´õÀÇ ¿µÇâ·Â ºÐ¼®
- EU³» Áö¿ªÀû °úÁ¦, °ø±Þ¾÷ü¿¡ ´ëÇÑ ±³À° Ã¥ÀÓ°ú ±âȸ, ¾ÏÈ£È ¹Îø¼º¿¡ °üÇÑ ÁÖÁ¦
¸ñÂ÷
Á¦1Àå ÁÖ¿ä Á¶»ç °á°ú
Á¦11Àå ´õ ³ªÀº »ç¿ëÀÚ °æÇè
Á¦12Àå º¸¾È°ú Ã¥ÀÓÀÇ °È
Á¦13Àå È¿À²¼ºÀÇ Çâ»ó
Á¦2Àå ÁÖ¿ä ¿¹Ãø
Á¦3Àå ÁÖ¿ä ±â¾÷°ú ¿¡ÄڽýºÅÛ
Á¦4Àå Áö¿ªÂ÷¿Í »óÈ£¿î¿ë¼º
Á¦5Àå ±³À°
Á¦6Àå ¾ÏÈ£ ¹Îø¼º
KSA 24.11.15
Actionable Benefits:
- Understand the current state of the Electronic Identification, Authentication, and Trust Services (eIDAS) market and the impact of Post-Quantum (PQ) resistance on it.
- Identify threats to eIDAS goals and the mitigations to implement to be prepared.
- Understand key market challenges and the opportunities for vendors to differentiate themselves.
Critical Questions Answered:
- What areas of eIDAS will be affected by PQ resistance?
- Will PQ exacerbate regional differences in implementation and threaten interoperability?
- What protections should be put into place now?
Research Highlights:
- Key findings and forecasts, with alignment to eIDAS regulation goals.
- Key companies and ecosystems, analyzing the impact of nine vendors in the market.
- Sections exploring regional challenges within the European Union (EU), the education responsibility and opportunity for vendors, and the topic of crypto-agility.
Who Should Read This?
- Security leadership of companies offering or depending on trusted signature infrastructure.
- Marketing professionals of Hardware Security Module (HSM) and trust service providers.
- Cryptography and PQ-interested professionals looking to understand practical challenges and approaches in a live example project.
TABLE OF CONTENTS
1 KEY FINDINGS
11 BETTER USER EXPERIENCE
12 INCREASED SECURITY AND LIABILITY
13 GREATER EFFICIENCY
2 KEY FORECASTS
3 KEY COMPANIES AND ECOSYSTEMS
4 REGIONAL VARIATION AND INTEROPERABILITY
5 EDUCATION
6 CRYPTO-AGILITY