ID:SMART 2025 Konferenz

Date: 19.-20.02.2025
Duration: 09:30-15:30
Location: Fraunhofer SIT
Rheinstraße 75
64295 Darmstadt
Diese Veranstaltung wird als Weiterbildung im Sinne der T.I.S.P.-Rezertifizierung anerkannt

Program

Day 1 (Wed, Feb 19st, 2025)
09:30 Registration and Coffee
10:00
Gisela Meister
Gisela Meister
Opening and Welcome - Dr. Gisela Meister
10:15
Matthias Intemann
BSI
Matthias Intemann
Impulse Speech

In an era where digital identities are the cornerstone of secure online interactions, the EU is striving to set global standards in cybersecurity through regulation and standardisation. However, the challenge remains: how do we foster innovation while ensuring compliance with evolving legal frameworks? This keynote will incentivise addressing the balance between security, interoperability, and technological advancement. From the complexities of the Cyber Resilience Act to the evolving eIDAS framework, opportunities and roadblocks through regulatory innovations try paying respect to the dynamic nature of cybersecurity. Can Europe lead the way without stifling technological innovation? Join us as we navigate the path toward a secure and future-proof digital landscape.

CAST Members can download the documents here.
10:45
Camille Dornier
Legal Officer at European Commission
Camille Dornier
CRA and its SR for important and critical products (remote)
CAST Members can download the documents here.
Block 1 - Regulatory Aspects I - Moderatorin: Dr. Gisela Meister
11:15
Holger Bentje
PHOENIX TESTLAB GmbH, REDCA Chair
Holger Bentje
The application of the new cybersecurity requirements under the Radio Equipment Directive (RED)
EN 18031-x in practice

Wireless is in. Many products are now equipped with wireless interfaces to connect them to the Internet. This increases the risk of being exposed to cyberattacks. From August 1, 2025, only radio equipment that have implemented basic cybersecurity protection may be placed on the European market. In addition to the protection of the network, the protection of personal data and privacy and protection against fraud will also be an essential new requirement of the European Radio Equipment Directive (RED). These risks can be assessed using the new EN 18031-x series of standards.

CAST Members can download the documents here.
11:45
Arno Fiedler
Nimbus
Arno Fiedler
Harmonised governmental identities in the European trust domain, just a dream?

As early as 2012, the first drafts of the eIDAS regulation were already pursuing the objective of harmonising both trust services and state eID procedures in the European single market. While trust services can now interact in a uniform manner thanks to the ETSI and CEN standards for formats, protocols and certification policies, this is not yet the case for European eID services. In his presentation, Arno Fiedler shares his views on the success factors of the amended eIDAS regulation, which must be implemented by the end of 2026.

CAST Members can download the documents here.
12:15 Lunch Break (60min)
Block 2 - Regulatory Aspects II - Moderator: Peter Rost
13:15
Markus Mösenbacher
Infineon
Markus Mösenbacher
EU eIDAS-2, LSPs (1st run), Review on PID & ODI

The LSPs (Large Scale Pilots) funding program was launched in 2022 with a primary focus on introducing digital technology to citizens, businesses, and public administration. One of the key objectives of the LSP is to implement pilot projects for the EUDIW (EU Digital Identity Wallet). As of April 2023, four LSP projects have been initiated to work towards this goal.

The EUDIW aims to drive innovation across various use cases, particularly in governmental applications (PID- Personal Identity) and industry applications (ODI-Organizational Digital Identity). These application areas are recognized to have significant untapped potential in enhancing trust and security within the digital ecosystem.

The speech shows the evolution of the eIDAS regulation and highlights the identified obstacles and challenges based on an analysis of an LSP that focuses on the combined use cases of ODI and PID.

CAST Members can download the documents here.
13:45
Torsten Lodderstedt
EUDI Wallet Projekt der SPRIND GmbH
Torsten Lodderstedt
The EUDIW, Architecture and Rollout plan

The talk will present the status and overall architecture of the EUDIW as well as the architecture of the German EUDIW ecosystem. It will also shed some light on the current rollout plan.

CAST Members can download the documents here.
14:15
Markus Vervier
X41 D-Sec GmbH
Markus Vervier
DORA in der Praxis

Die EU-Verordnung DORA markiert einen entscheidenden Wendepunkt in der IT-Sicherheitslandschaft: Anstelle von rein formalen Compliance-Anforderungen werden nun auch belastbare Nachweise gefordert, dass etablierte Schutzmaßnahmen auch tatsächlich wirksam sind. Für IT-Sicherheitsexperten bedeutet dies: Klassische Maßnahmen wie Penetrationstests, Schwachstellenscans und der Einsatz spezialisierter Sicherheitsprodukte gewinnen an Relevanz, werden aber gleichzeitig einer strengeren Prüfung unterzogen. Zusätzliche Anforderungen in der täglichen Praxis ergeben sich aus zentralen Neuerungen wie der verpflichtenden Root-Cause-Analyse von Vorfällen, der nachhaltigen Beseitigung von Schwachstellen und der Meldung schwerwiegender Sicherheitsvorfälle.

Darüber hinaus rücken mit DORA auch Bereiche stärker in den Fokus, die bisher vernachlässigt wurden: Die systematische Überprüfung von Open Source-Komponenten und proprietärer Software, die bisher oft nur in Ansätzen umgesetzt wurde, wird in Zukunft zu einer zentralen Aufgabe.

Die Verordnung verspricht zwar langfristig eine deutliche Verbesserung der Cyber-Resilienz. Sie erfordert aber auch erhebliche Investitionen in Personal, Prozesse und Werkzeuge.

Der Vortrag zeigt anhand konkreter Beispiele, wie Unternehmen ihre Sicherheitsstrategien weiterentwickeln und den erhöhten DORA-Anforderungen erfolgreich begegnen können.

CAST Members can download the documents here.
14:45 Coffee Break (15min)
Block 3 - EUDI Wallet Applications and Use Cases - Moderator: Dr. Andreas Wolf
15:00
Andreas Plies
Authada
Andreas Plies
Holger Frank
On challenges and advantages of mobile Identity management - EUDI wallet on mobile devices.

For several years, efforts have been underway to establish technical standards for the European digital Identity Wallet (EUDI-Wallet), a digital wallet designed for use across Europe. Technical details are still being refined within international standardization bodies.

One of the main challenge is developing secure solutions that comply with the stringent data protection and security requirements for the data of over 400 million EU citizens. In Germany, a temporary solution involving HSM-based central key storage has been adopted until decentralized storage becomes feasible for the majority of users.

This paper examines the challenges of implementing a secure and privacy-preserving decentralized wallet and outlines potential approaches for decentralized mobile solutions leveraging current and future secure hardware.

CAST Members can download the documents here.
15:30
Karsten Kochan
gematik
Karsten Kochan
eHealthID for the personal health record

Recap and outlook, looking back on one year of the German eHealthID and talk about how to improve the digital identity for the German health area more. Which new features are available with the January update and what to expect in 2025 when using the eHealthID to access your electronic patient record? With patient consent new options are available to the users allowing individual settings and security measures fitting to their needs. Biometric sensors, limited single sign on and extended device binding validity times are now available.

CAST Members can download the documents here.
16:00 Coffee Break (15min)
16:15
Wijnand Machielse
SRC Security Research & Consulting GmbH
Wijnand Machielse
Connecting the dots: How Harmonised Berlin Group Open Finance Standards are empowering EU Digital Identity Wallets with payments and account information services

As the European Union advances its Digital Identity Wallet initiative, the established Berlin Group Open Finance standards, already adopted by 80% of the European market and beyond, are strategically positioned to enhance the EU Digital Identity Wallet's payment capabilities, creating a seamless bridge between digital identity and financial services. This presentation explores how standardised Open Finance APIs serve as crucial building blocks for integrating payment functionalities into EU Digital Identity Wallets.

CAST Members can download the documents here.
16:45
Detlef Hillen
SRC Security Research & Consulting GmbH
Detlef Hillen
Possible application scenarios in the banking industry

The new eIDAS Regulation stipulates (among others) that all member states (either themselves or via authorized service providers) must provide their citizens with an EUDI Wallet. In addition, areas of services are also defined in which the service provider shall (as an obligation) accept the EUDI Wallet in future for the purposes of user identification and authentication. “Banking and financial services” are explicitly mentioned in the regulation as one of these areas. However, the exact scope of this acceptance obligation in banking services is currently still controversial. The presentation provides an overview of the current state of developments and shows various scenarios for use in payment and banking applications.

CAST Members can download the documents here.
17:15 Hotel check-in Break
18:30
Clara Pfeuffer
ATHENE Digital Hub Cybersecurity | Startups
StartUp-Pitch
  • Sign8 (München)
  • Infrafon (Freiburg)
18:45 Dinner
Day 2 (Thu, Feb 20nd, 2025)
09:45 Welcome to the second day of the ID:SMART Workshop 2025
Block 4 - eIdentities - Moderator: Uwe Schnabel
10:00
Phillip Niemeier
Research Industrial Systems Engineering (RISE) Forschungs-, Entwicklungs-/Großprojektberatung GmbH
Phillip Niemeier
Securing the Future of Digital Identities: The Convergence of eID, Wallets and Confidential Computing

European states are facing challenges posed by global IT platforms that dominate identity provision, creating conflicts with national interests related to digital sovereignty and data protection. This presentation will highlight contributions to digital ID, electronic wallet, and confidential computing technologies, as exemplified by RISE ID solutions for the German public health sector. This initiative has the potential to serve as a model for other nations looking to enhance digital identity security and reclaim digital sovereignty.

CAST Members can download the documents here.
10:30
Karsten Klohs
achelos
Karsten Klohs
Challenges in Designing Mobile e-ID Eco-Systems

Four characteristics are essential for the design of e-ID eco systems:

  • ensuring full user control over their identity,
  • establishing and maintaining trust in the eco-system,
  • enforcing attack robustness,
  • and (preferably) supporting offline use cases.

This presentation illustrates the resulting challenges arising from different e-ID technologies, the initial identity provisioning, the relationship between assurance and attack resistance and decentralized designs, based on examples like the German e-Health Infrastructure, the EU Digital Identity Wallets, and systems handling classified data.

CAST Members can download the documents here.
11:00
Armin Lunkeit
Procilon
Armin Lunkeit
Electronic Identities and Cryptography Applications in Use Cases of eJustice and eNotary Services

The digital transformation has led to the adoption of electronic identities and cryptographic technologies in eJustice and eNotary applications. These technologies enhance security, efficiency, and accessibility while ensuring compliance with legal and regulatory frameworks. eIDs facilitate secure authentication and authorization of users e. g. in digital court proceedings. Cryptographic mechanisms, such as digital signatures and encryption, provide integrity, confidentiality, and non-repudiation. This presentation demonstrates their applications in eJustice and eNotary services and challenges in their implementation.

CAST Members can download the documents here.
11:30 Coffee Break (15min)
Block 5 - Post Quantum Cryptopgraphy - Moderator: Detlef Kraus
11:45
Peter Rost (in Vertretung von Leonie Bruckert)
secunet
Peter Rost (in Vertretung von Leonie Bruckert)
Post-quantum Cryptography for Classified Information

Future quantum computers of a sufficient size and quality are able to break many widely deployed cryptographic algorithms. To tackle this threat, post-quantum cryptography (PQC) has been researched and standardized.

The migration we are facing is comprehensive and profound, as almost every IT security solution has to be adopted to use PQC. There is a particular urgency when it comes to sensitive information and systems with long migration times.

This talk illustrates PQC migration using the example of working with classified information.

CAST Members can download the documents here.
12:15
Frank Morgner
Bundesdruckerei
Frank Morgner
Quantum computing and eIDAS

As quantum computing advances rapidly, the cryptographic foundations underpinning modern digital security face significant threats. This is particularly critical for trust services within the European Union's eIDAS (electronic Identification, Authentication, and trust Services) framework, and related ecosystem which ensures secure and trusted electronic transactions. Current cryptographic algorithms, such as RSA and ECC (Elliptic Curve Cryptography), are vulnerable to quantum algorithms like Shor’s algorithm, which can potentially break these encryption schemes. With the imminent rise of quantum computing, the necessity for Post-Quantum Cryptography (PQC) and an implementation of crypto agility becomes evident to preserve the integrity, confidentiality, and authenticity of the eIDAS ecosystem and the related services. The eIDAS framework, which relies heavily on digital signatures, seals, and timestamps, must transition to crypto agility and quantum-resistant algorithms to ensure trust in electronic identities, cross-border recognition, and secure transactions in a post-quantum world. This talk emphasizes the urgency of adopting PQC solutions to safeguard eIDAS trust services, highlighting the need for early preparation, standards development, and timely integration into current infrastructures. Failure to adapt could undermine the very essence of digital trust and security across the EU.

CAST Members can download the documents here.
12:45
Markus Mösenbacher
Infineon
Markus Mösenbacher
Start in eine quantensichere Zukunft – erste CC Zertifizierung eines PQ-Algorithmus

Innerhalb der kommenden 10 bis 20 Jahre werden Quantencomputer voraussichtlich so leistungsfähig sein, dass sie die derzeitigen kryptografischen Algorithmen brechen und die digitale Sicherheit gefährden können. Dokumente wie eIDs die heute ausgestellt werden und viele Jahre gültig sind, müssen vor künftigen Angriffen durch Quantencomputer geschützt sein. Das gilt auch für verschlüsselte Nachrichten und E-Mails, die heute verschickt werden. Diese können gespeichert und später von Quantencomputern angegriffen werden. Post-Quanten-Kryptografie-Algorithmen wie der Module-Lattice-Based Key Encapsulation Mechanism (ML-KEM) sollen diesen Angriffen widerstehen und die Integrität der digitalen Infrastruktur stärken. Eine sichere Implementierung dieser Algorithmen ist entscheidend, um klassische Sicherheitsangriffe abzuwehren.

Der Vortrag gibt eine kurze Einführung über die Thematik, geht auf die allgemeine Herausforderung an die Industrie sowie für die Implementierung und CC Zertifizierung ein.

CAST Members can download the documents here.
13:15 Lunch Break (60min)
Block 6 - Mobile Security - Moderator: Dr. Friedrich Tönsing
14:15
Tim Ohlendorf
IBM
Tim Ohlendorf
An introduction to remote attestation schemes for mobile devices

Smartphones, once mere communication devices, have become an integral part of our daily lives. For security-critical use cases such as mobile banking, ensuring the secure and untampered state of applications and the mobile device they run on is of paramount importance. This presentation delves into the world of mobile remote attestation, exploring the state of the art in the field and demonstrating its real-world applicability. Remote attestation allows a verifier to confirm that a prover's system (such as a smartphone) is in a trusted state and has not been tampered with.

CAST Members can download the documents here.
14:45
Dr. Jochen Saßmannshausen
Telekom Security GmbH
Dr. Jochen Saßmannshausen
Enhancing Trust and Security in 5G/6G Base Stations through Secure Hardware Components
Insights from the BaseSec Project

The BaseSec project enhances 5G/6G security by addressing base station vulnerabilities to ensure high data rates, low latency, and reliable QoS.

It designs a hardware security module with a secure element and protected storage to safeguard cryptographic keys, detect tampering, and enforce authorized configurations.

After analyzing security gaps and compliance with standards like the CRA, the project now focuses on integration, protocol enhancements, system resilience and certification.

BaseSec will provide certification recommendations and input for technical guidelines and protection profiles to support secure 5G/6G deployment and a resilient communication infrastructure.

CAST Members can download the documents here.
15:15 Conclusions and 2025 ID:SMART Workshop announcement
15:30 Fingerfood

Information and Contact

If you have any questions please contact:

Moderator

Members of the ID:Smart
Programme Committee
Email:

Administration

Simone Zimmermann
CAST e.V.
Tel.: +49 6151 869-230
Email:

Routing

Start


CAST e.V.
Rheinstraße 75
64295 Darmstadt

Upcoming CAST Events

Recht und IT-Sicherheit: Datenschutzgerechter Umgang mit Künstlicher Intelligenz | Anforderungen der KI-VO und DS-GVO in der Praxis 06.03.2025
hot topic "Kryptoagilität" 15.05.2025
MedCAST 25 - Sichere, digitale Transformation der Gesundheitswirtschaft 22.05.2025
KI und Cybersicherheit 03.07.2025
24th International Conference of the Biometrics Special Interest Group (BIOSIG 2025) 25.-26.09.2025
Quantentechnologie und Quantencomputer-resistente Sicherheit 23.10.2025
Cybersicherheit für den Mittelstand 20.11.2025