Stay informed about the latest updates on pan-European regulations and laws and their impact on digital trust service provider
Working with a signature platform TSP and PaaS provider offers many benefits, including improving the quality, efficiency, and security of their signature solutions, increasing the confidence of...
In the case of electronic signatures, an integrated solution can help solve these problems by digitizing process gaps and speeding up and simplifying document processing.
Electronic signatures are an essential part of the digital transformation for the fintech and banking industry. Electronic signatures can help improve the efficiency and accuracy of processes such as...
A TSP for SaaS providers offers many benefits, including improving the quality, efficiency, and security of their signature solutions, increasing the trust of their customers, and reducing risks.
The technical integration of trust solutions in a signature platform offers cloud providers many advantages, e.g. scaliability, latest security standards or standardized APIs.
Enterprises and ERP providers face complex technical challenges, such as company size or internationalization, when implementing e-signature solutions and integrating a TSPs.
Financial service providers can boost conversion rates by seamlessly integrating trust solutions and efficiently navigating compliance requirements.
The technical integration of TSP's digital identity and e-signature solutions enables SaaS and PaaS providers to comply with the latest security and interface standards.
Discover future-proof technological solutions and innovations for your business success.
In our Help Center, you will find the answers to our frequently asked questions.
This section will offer exciting interviews and discussions from various sectors, such as finance, HR, and health. Our experts describe the current challenges in their fields, provide compelling...
Our customers and partners have successfully streamlined their processes and digitized the final step to legally valid contract conclusion. Find out how they benefit from our digital identity, secure...
Learn what an electronic signature is
What types of electronic signatures there are
How to sign a document electronically
The embedded e-signing platform Smart Registration und Signing Service provides qualified and advanced electronic signatures for the EU jurisdiction.
The embedded e-signing platform Smart Registration and Signing Service offer a combined solution of identification and one-time e-signatur for KYC-processes in the European jurisdiction.
The embedded e-signing platform Smart Registration and Signing Service provides qualified and advanced electronic signatures for the Swiss jurisdiction.
The embedded e-signing platform Smart Registration and Signing Service offer a combined solution of identification and one-time e-signatur for KYC-processes in Swiss jurisdiction.
The embedded e-signing platform Smart Registration and Signing Service offer identification via valid Swiss mobile number and advanced electronic signtuare in Switzerland
Learn what an electronic seal is here
What types of electronic seals there are
How a company successfully seals electronically
The embedded e-sealing software Smart Registration and Signing Service provides regulated electronic seal for Swiss public authorities in accordance with ZertES and TAV.
The reptetive e-sealing solution Smart Registration and Signing Service provides regulated and advanced electronic seals for organizations in the Swiss jurisdiction
The embedded e-sealing solution Smart Registration and Signing Service provides qualified and advanced electronic seals for organizations in the European jurisdiction.
Learn what an online identity check is
What current identification methods are available on the market
What the areas of application and advantages of online identification are
The embedded e-signature platform Smart Registration and Signing Service offers a wide range of identification methods to register for eIDAS-compliant e-signatures.
The embedded e-signature platform Smart Registration and Signing Service offers a wide range of identification methods to register for ZertES-compliant e-signatures.
Simple and intuitive Face-2-Face identification hub solution for businesses to register people for electronic signature.
Learn what two-factor authentication is
Why it takes an authentication solution for the electronic signature
The embedded e-signature platform Smart Registration and Signing Service provides a diverse array of authentication methods for approving electronic signatures.
Explore our range of e-signature and e-seal service packages for partners, SMEs, and enterprises. Choose from various packages tailored to your needs.
Here are the frequently asked questions about our products and services.
On our Dev Hub, you will find all the essential information about using the interfaces provided by Swisscom.
Our GitHub page contains Postman examples and four Java/C#-based clients for the signature service that use the iText/PDF Box libraries and the signature service wiki.
In our repository, you will find the documentation on Swisscom CA and PKI, our CP/CPS, and terms of use.
Here you will find a selection of PDF Library providers that support the interfaces provided by Swisscom.
You can inform Swisscom about potential security vulnerabilities here.
You are welcome to contact us via the support page.
Please visit our Help Center.If you can't find an answer to your question, please don't hesitate to contact our support team.
Our products are integrated into ready-made digital customer solutions, enabling processes without media discontinuity. Here is an overview of our solution partners.
Discover how customers are benefiting from our digital identity, secure authentication, and e-signature solutions and services. Our customers are active in various industries
Our partner log-in area is aimed at our solution partners.Are you still waiting for a partner log-in? Get in touch.
Swisscom Trust Services is a leading provider of trust services and provides qualified electronic signatures in the legal areas of the EU and Switzerland.
We are a team of more than 30 experts providing innovative, complete, compliant, and easy-to-integrate identity-based and electronic signature services.
The European Signature Dialogue is an association of the most important European providers of electronic signatures.
Today, the registered association Bitkom represents more than 2,000 member companies - including around 1,000 high-performing SMEs, over 500 innovative tech start-ups, almost half of the 40 DAX...
With around 1,000 member companies, eco is Europe's largest Internet industry association. Since 1995, eco has been instrumental in shaping the internet, promoting new technologies, creating...
The Competence Center for Applied Security Technology, CAST e.V. offers a wide range of services in the security of modern information technologies. It is the contact for IT security issues.
The Bundesverband IT-Sicherheit e.V. (TeleTrusT) is a competence network comprising domestic and foreign members from industry, administration, consulting and science, and thematically related...
We seek experts with an exciting track record who want to contribute to our growth.
In this section, you will find our press contact, the latest press releases, company information, and media content for download.
Stay informed about the latest updates on pan-European regulations and laws and their impact on digital trust service provider
Working with a signature platform TSP and PaaS provider offers many benefits, including improving the quality, efficiency, and security of their signature solutions, increasing the confidence of...
In the case of electronic signatures, an integrated solution can help solve these problems by digitizing process gaps and speeding up and simplifying document processing.
Electronic signatures are an essential part of the digital transformation for the fintech and banking industry. Electronic signatures can help improve the efficiency and accuracy of processes such as...
A TSP for SaaS providers offers many benefits, including improving the quality, efficiency, and security of their signature solutions, increasing the trust of their customers, and reducing risks.
The technical integration of trust solutions in a signature platform offers cloud providers many advantages, e.g. scaliability, latest security standards or standardized APIs.
Enterprises and ERP providers face complex technical challenges, such as company size or internationalization, when implementing e-signature solutions and integrating a TSPs.
Financial service providers can boost conversion rates by seamlessly integrating trust solutions and efficiently navigating compliance requirements.
The technical integration of TSP's digital identity and e-signature solutions enables SaaS and PaaS providers to comply with the latest security and interface standards.
Discover future-proof technological solutions and innovations for your business success.
In our Help Center, you will find the answers to our frequently asked questions.
This section will offer exciting interviews and discussions from various sectors, such as finance, HR, and health. Our experts describe the current challenges in their fields, provide compelling...
Our customers and partners have successfully streamlined their processes and digitized the final step to legally valid contract conclusion. Find out how they benefit from our digital identity, secure...
Learn what an electronic signature is
What types of electronic signatures there are
How to sign a document electronically
The embedded e-signing platform Smart Registration und Signing Service provides qualified and advanced electronic signatures for the EU jurisdiction.
The embedded e-signing platform Smart Registration and Signing Service offer a combined solution of identification and one-time e-signatur for KYC-processes in the European jurisdiction.
The embedded e-signing platform Smart Registration and Signing Service provides qualified and advanced electronic signatures for the Swiss jurisdiction.
The embedded e-signing platform Smart Registration and Signing Service offer a combined solution of identification and one-time e-signatur for KYC-processes in Swiss jurisdiction.
The embedded e-signing platform Smart Registration and Signing Service offer identification via valid Swiss mobile number and advanced electronic signtuare in Switzerland
Learn what an electronic seal is here
What types of electronic seals there are
How a company successfully seals electronically
The embedded e-sealing software Smart Registration and Signing Service provides regulated electronic seal for Swiss public authorities in accordance with ZertES and TAV.
The reptetive e-sealing solution Smart Registration and Signing Service provides regulated and advanced electronic seals for organizations in the Swiss jurisdiction
The embedded e-sealing solution Smart Registration and Signing Service provides qualified and advanced electronic seals for organizations in the European jurisdiction.
Learn what an online identity check is
What current identification methods are available on the market
What the areas of application and advantages of online identification are
The embedded e-signature platform Smart Registration and Signing Service offers a wide range of identification methods to register for eIDAS-compliant e-signatures.
The embedded e-signature platform Smart Registration and Signing Service offers a wide range of identification methods to register for ZertES-compliant e-signatures.
Simple and intuitive Face-2-Face identification hub solution for businesses to register people for electronic signature.
Learn what two-factor authentication is
Why it takes an authentication solution for the electronic signature
The embedded e-signature platform Smart Registration and Signing Service provides a diverse array of authentication methods for approving electronic signatures.
Explore our range of e-signature and e-seal service packages for partners, SMEs, and enterprises. Choose from various packages tailored to your needs.
Here are the frequently asked questions about our products and services.
On our Dev Hub, you will find all the essential information about using the interfaces provided by Swisscom.
Our GitHub page contains Postman examples and four Java/C#-based clients for the signature service that use the iText/PDF Box libraries and the signature service wiki.
In our repository, you will find the documentation on Swisscom CA and PKI, our CP/CPS, and terms of use.
Here you will find a selection of PDF Library providers that support the interfaces provided by Swisscom.
You can inform Swisscom about potential security vulnerabilities here.
You are welcome to contact us via the support page.
Please visit our Help Center.If you can't find an answer to your question, please don't hesitate to contact our support team.
Our products are integrated into ready-made digital customer solutions, enabling processes without media discontinuity. Here is an overview of our solution partners.
Discover how customers are benefiting from our digital identity, secure authentication, and e-signature solutions and services. Our customers are active in various industries
Our partner log-in area is aimed at our solution partners.Are you still waiting for a partner log-in? Get in touch.
Swisscom Trust Services is a leading provider of trust services and provides qualified electronic signatures in the legal areas of the EU and Switzerland.
We are a team of more than 30 experts providing innovative, complete, compliant, and easy-to-integrate identity-based and electronic signature services.
The European Signature Dialogue is an association of the most important European providers of electronic signatures.
Today, the registered association Bitkom represents more than 2,000 member companies - including around 1,000 high-performing SMEs, over 500 innovative tech start-ups, almost half of the 40 DAX...
With around 1,000 member companies, eco is Europe's largest Internet industry association. Since 1995, eco has been instrumental in shaping the internet, promoting new technologies, creating...
The Competence Center for Applied Security Technology, CAST e.V. offers a wide range of services in the security of modern information technologies. It is the contact for IT security issues.
The Bundesverband IT-Sicherheit e.V. (TeleTrusT) is a competence network comprising domestic and foreign members from industry, administration, consulting and science, and thematically related...
We seek experts with an exciting track record who want to contribute to our growth.
In this section, you will find our press contact, the latest press releases, company information, and media content for download.
Quantum computers keep hitting the headlines with actual or alleged breakthroughs. This summer, a research team from IBM published a paper postulating the practical usefulness of existing quantum computers. The researchers claim to have found a way to recognize the high susceptibility to errors of existing devices precisely and to take them into account consciously. This means that quantum computers could be used even before the problem of their increased susceptibility to errors can be technically overcome. At some point, this will happen, and the new computer concept will realize its full potential. To understand why this scenario can be dangerous, we first dive into the principle of quantum computing and how current encryption works.
One bit assumes either the value one or the value 0. Our entire digital technology is based on binary code. In the mysterious, tiny quantum world, binary code no longer applies. Quantum objects can assume two states simultaneously or an undefined intermediate state. A well-known example of the quantum world is probably Schrödinger's cat. The thought experiment describes that a hypothetical cat in a box has the status of being both dead and alive at the same time - until someone opens this box and takes a look. The situation is similar with quantum bits. Their state can only be determined by a measurement. Until this takes place, they are in an undefined state or assume the values 1 and 0 at the same time.
This property of quantum objects, superposition, which is inconceivable in our macroscopic world, ensures that very complex mathematical problems can be solved much faster. Or even make it possible to solve problems that cannot be solved in real-time today. That is precisely what the current state of research suggests. The developers of the Canadian "Borealis" computer claim to have solved a problem in 36 microseconds that would have taken a conventional supercomputer thousands of years. Solving problems faster - it sounds convincing but can be dangerous.
On the Internet and today's digital world, superior quantum computers could attack asymmetric cryptography. The system uses an algorithm to generate a public key from a private key, and only the public key is transmitted over the Internet. The connection between the private and public keys is established using complex mathematical operations that are difficult to reverse. This can be, e.g., the multiplication of huge prime numbers. This calculation is simple. However, the reverse prime factorization of the result is very complex. Today's encryptions are based on the fact that the most powerful conventional computers cannot perform such calculations in a reasonable amount of time. Quantum computers could change that. They would suddenly make it possible to calculate private keys from public keys.
In theory, special algorithms developed for quantum computers already exist. As soon as the appropriate hardware is available, you can perform search processes much faster. The Grover algorithm speeds these up by a factor of two. With a linear search, it would take 2128 calculation steps to crack an AES-128 encryption - with the Grover algorithm, on the other hand, 'only' 264 steps. In this case, the key length could be doubled, and the encryption would be secure again. But it only applies to the Grover algorithm. Suppose even more powerful methods for quantum computers are found in the future. In that case, longer and longer keys will no longer be sufficient, and completely new concepts will be needed - problems whose reversal is too complex even for quantum computers. Work is already underway on the corresponding post-quantum algorithms. These will deal with problems within algebraic geometry or high-dimensional lattices, for example.
When mathematicians and computer scientists rack their brains over the most complicated problems and new algorithms, it initially seems anything but relevant to everyday life. However, asymmetric cryptography is now part of everyday life for almost everyone - albeit mostly unconsciously. Secure connections between websites and users (HTTPS) are based on this technology, as is end-to-end encryption in messengers such as WhatsApp. Digital documents, such as those to be stored in an ID wallet that the EU is currently developing, would also function according to the pattern of asymmetric cryptography. The idea is that anyone can check them with a public key, but only authorized persons with private keys can issue them. Qualified electronic signatures also use asymmetric cryptography.
This could pose a potential threat in the future: Criminals with access to a quantum computer with superior computing power could crack the conventional algorithms that form the basis of all these encryptions in a short time. It allows them to read encrypted data traffic and messages and forge digital documents and signatures. This would also render existing digitally signed contracts worthless in one fell swoop.
Although this danger is still hypothetical and not acute, we should not ignore it. The development of quantum computers continues unabated, and at some point, they will come into practical use - be it in 10, 20, or 30 years. Then, Murphy's Law will strike at some point, and the devices will fall into the wrong hands, for better or worse. In other words, we must be prepared. Therefore, IT security and trust service providers must design their hardware and software so that they can integrate new, quantum-safe algorithms in the future. The US standardization authority NIST has already published the first algorithm candidates for such a post-quantum cryptography world, but they still have to prove their strength. In any case, the race has already begun.
08.11.2024
Read blog article
07.11.2024
Read blog article
30.10.2024
Read blog article
23.10.2024
Read blog article