SAP Security Research and Technische Universität Darmstadt Join Forces to Take a Quantum Leap

2018/11/20

SAP Security Research and Technische Universität Darmstadt Join Forces to Take a Quantum Leap

SAP SE (NYSE: SAP) announced a cooperation between the SAP Security Research organization and the Technische Universität Darmstadt (TU Darmstadt), one of the leading security centers in Germany, to investigate quantum-resistant security technologies for software development processes at SAP one of the leading security centers in Germany, to investigate quantum-resistant security technologies for software development processes at SAP.

In recent years, significant advancement has been made in quantum computer research. As these large-scale quantum computers become more readily available, the vast majority of public-key cryptosystems deployed in current IT systems will become vulnerable. To counter this threat, it is important to deploy postquantum-cryptography to current systems, leaving enough time to prepare for a complete cryptography rollout before large-scale quantum computers are widespread.

Fundamental research has already been conducted by TU Darmstadt, its collaborative research center CROSSING and its CYSEC profile area for cybersecurity. One major research result achieved by the cryptographic expert Prof. Johannes Buchmann and his team is a hash-based, postquantum signature scheme. It was recently standardized as the first postquantum signature scheme in RFC 8391 by the Internet Research Task Force.

“By bridging the scientific world and product development, we implement our goal of thinking ahead and preparing the way for product security at SAP,” said Roger Gutbrod, head, SAP Security Research, SAP. “The goal of the collaboration with the Technische Universität Darmstadt is to adapt this fundamental research and prepare SAP for the next generation of security.”

By working closely with Prof. Buchmann and his team, SAP will be able to adapt its software development processes to prepare them for the rise of quantum computers while maintaining high IT security standards.

go to list