share_log

格尔软件(603232.SH):参与了我国抗量子密码的国家标准制定

Koal Software (603232.SH): participated in the establishment of national standards for China's post-quantum cryptography.

Gelonghui Finance ·  Oct 17, 2024 19:36

On October 17, Geer Software (603232.SH) stated at the performance briefing that in terms of product research and development, Geer Software has released a complete set of domestic quantum security solutions and series of products, including quantum security PKI/CA, key management, gateway, cipher, vpn, signature verification, etc., fully supporting a smooth transition to post-quantum cryptographic algorithms. In addition, the company has also developed post-quantum cryptographic cards and proposed a three-stage post-quantum cryptographic migration path design, covering security access levels, transformation of public key infrastructure (PKI), and migration of applications and data levels; in terms of ecological cooperation, Geer Software has deep collaborations with multiple universities, conducting research, standardization, and industrialization promotion in the field of post-quantum algorithms. Furthermore, the company has jointly established the G60 Quantum Cryptography Application Innovation Center with multiple companies, aiming to build a complete industry chain ecosystem for quantum cryptography technology and to promote its innovation and development; in terms of standardization, Geer Software has participated in the formulation of China's national standards for post-quantum cryptography, contributing to the standardization of post-quantum cryptography technology. In the future, as quantum computers mature further, post-quantum cryptography will become an important means to counter quantum computer attacks. Currently, governments and academia worldwide are actively promoting the formulation and application of post-quantum cryptography standards to address the security challenges posed by quantum computers. In addition, the company has also planned to expand its current business further in the field of identity security by developing areas such as machine identity and autonomous identity, aiming to cover more digital identity application scenarios beyond identity authentication.

Disclaimer: This content is for informational and educational purposes only and does not constitute a recommendation or endorsement of any specific investment or investment strategy. Read more
    Write a comment