SlideShare a Scribd company logo
https:/
/quant-x-sec.com/ | xb@quant-x-sec.com
API Protection on Highly Volatile Threat Landscapes
xb@quant-x-sec.com
Our Expertise
10/28/21 xb@quant-x-sec.com 3
Industrial/Scientific Activities
Integration of quantum technologies to classical infrastructures
Investigation of open questions in Post-Quantum Security, see
https://github.com/Quant-X-Security-Coding-GmbH/QAA_Condition_Number
Quantum feasibility studies of algorithmic problems
New York
JULY
Australia
SEPTEMBER
Singapore
APRIL
Helsinki & North
MARCH
Paris
DECEMBER
London
OCTOBER
Jakarta
FEBRUARY
Hong Kong
AUGUST
JUNE
India
MAY
Check out our API Conferences here
50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees,
300k+ online community
Want to talk at one of our conferences?
Apply to speak here
10/28/21 xb@quant-x-sec.com 4
The Unique Meaning of Cryptography in Information Security
.
company a
company b
Infrastructure
& Computing
●
SIEM
●
IDS/IPS
●
Endpoint Protection
●
Malware Protection
●
Access Controls
●
etc.
Communication
●
Cryptography
10/28/21 xb@quant-x-sec.com 5
Preserving Privacy in the Face of High Performance Attack Vectors
Mathematics
Computer Science
Implementation
System Integration
Application Integration
Network
Administration
Management
Users
THREATS
Increasing Performance of Binary
Technologies
New Mathematical Solutions
Quantum Computing
Cryptography Stack
10/28/21 xb@quant-x-sec.com 6
Overview on High Performance Attack Vectors - Current
Threats
● Password and Cryptography Cracking Tools (Hashcat and similar tools)
● Aggregated computing resources and parallelization of attack processes
● New mathematical solutions affecting parameters and configuration of classical crypto
Countermeasures
Regularly check RFCs and recommendations of official Data Protection and InfoSec institutes for
1) Choice of algorithms
2) Key length
3) Algorithm parameter configuration
… and update your systems accordingly in alignment with depending parties.
10/28/21 xb@quant-x-sec.com 7
Overview on High Performance Attack Vectors – Near Future
Threats
Evolving Quantum Computing Technologies will make it possible to decrypt data encrypted by
1) Diffie-Hellmann
2) RSA
3) Elliptic Curves
Timeline: IBM guesses by 2023
Countermeasures
1) New post-quantum crypto algorithms
(NIST standardization round 3: https://csrc.nist.gov/Projects/post-quantum-cryptography/round-3-submissions)
2) Homomorphic Encryption (not based on 1) -3) in Threats :-)
3) Quantum Communication (new quantum hardware, expensive)
10/28/21 xb@quant-x-sec.com 8
Identify Assets of High Privacy Criticality by Information Risk Assessment
Your Business Processes and the respective IT-systems are your Assets!
1) Perform a CIA-Rating on your systems connected to the APIs. This will indicate the protection need of
the APIs.
The best candidates for post-quantum cryptography are the ones which process data which needs to
remain confidential for many years in the future.
The best candidates for a near time transition to homomorphic encryption are the ones with
● High Confidentiality and Integrity Classification
● Low Availability Rating
2) Perform an Information Risk Assessment to consider threats vs. the systems protection need. This will
help you to determine which new cryptography you might want to apply to which system.
(Guide for conduction IRAs: https://www.nist.gov/publications/guide-conducting-risk-assessments)
10/28/21 xb@quant-x-sec.com 9
X. Bogomolec | Quant-X Security & Coding GmbH | xb@quant-x-sec.com
Conclusion
Stay aware about upcoming threats and solutions.
...and
Introduce swift crypto patch processes!
Thank you!!!
Find these slides on https:/
/quant-x-sec.com/published.htm
(in the section Talks/Presentations at Conferences and Events)
New York
JULY
Australia
SEPTEMBER
Singapore
APRIL
Helsinki & North
MARCH
Paris
DECEMBER
London
OCTOBER
Jakarta
FEBRUARY
Hong Kong
AUGUST
JUNE
India
MAY
Check out our API Conferences here
50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees,
300k+ online community
Want to talk at one of our conferences?
Apply to speak here

More Related Content

PDF
Crossing the low-code and pro-code chasm: a platform approach
PDF
apidays LIVE Paris 2021 - Detecting and Protecting PII by Rob Dickinson, Resu...
PDF
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
PDF
apidays LIVE Paris 2021 - Synchronous Communication Patterns by Sébastien Ber...
PDF
The Elephant in the Kubernetes Room - Team Interactions at Scale @ KubeCon No...
PDF
APIdays Paris 2019 - Zero Downtime in API Management by Waldemar Rosenfeld, A...
PDF
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
PDF
apidays LIVE Paris 2021 - API Attack Simulator - Find your API vulnerabilitie...
Crossing the low-code and pro-code chasm: a platform approach
apidays LIVE Paris 2021 - Detecting and Protecting PII by Rob Dickinson, Resu...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE Paris 2021 - Synchronous Communication Patterns by Sébastien Ber...
The Elephant in the Kubernetes Room - Team Interactions at Scale @ KubeCon No...
APIdays Paris 2019 - Zero Downtime in API Management by Waldemar Rosenfeld, A...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - API Attack Simulator - Find your API vulnerabilitie...

What's hot (20)

PDF
apidays LIVE Hong Kong 2021 - Event-driven APIs & Schema governance for Apach...
PDF
apidays LIVE Singapore 2021 - What financial services can learn from Marketpl...
PDF
Tamino Mobile - XML based Integration, Development and Application Services f...
PPTX
Guide to an API-first Strategy
PDF
apidays LIVE Paris 2021 - API design is where culture and tech meet each othe...
PDF
apidays LIVE London 2021 - Quantum Duality of “API as a business” and “API as...
PDF
apidays LIVE Paris 2021 - Taming the beast by Markus Mueller, Apiida
PPTX
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
PPTX
apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...
PPTX
Executing on API Developer Experience
PDF
apidays LIVE Paris 2021 - Who writes the Docs? by Laura Vass, Pronovix
PDF
apidays LIVE London 2021 - Presenting the Kubernetes Browser by Daria Muehlet...
PPTX
INTERFACE, by apidays - Keeping the link between legacy and new by Vince Pad...
PDF
INTERFACE, by apidays - Playing with FHIR: Hacking FHIR and mHealth APIs by ...
PDF
apidays LIVE Paris - Avoid Building a Microservices Death Star by Przemek Kulik
PPTX
apidays LIVE Jakarta - Building an Event-Driven Architecture by Harin Honesty...
PDF
apidays LIVE Jakarta - Serverless powered Low Code by Alex-Adrien Auger, Sipios
PDF
apidays LIVE Paris 2021 - OpenAPI Generator - The Babel Fish of the API World...
PDF
The Best of Both Worlds: Introducing WSO2 API Manager 4.0.0
PDF
[WSO2Con USA 2018] Nightmare on SSO Street
apidays LIVE Hong Kong 2021 - Event-driven APIs & Schema governance for Apach...
apidays LIVE Singapore 2021 - What financial services can learn from Marketpl...
Tamino Mobile - XML based Integration, Development and Application Services f...
Guide to an API-first Strategy
apidays LIVE Paris 2021 - API design is where culture and tech meet each othe...
apidays LIVE London 2021 - Quantum Duality of “API as a business” and “API as...
apidays LIVE Paris 2021 - Taming the beast by Markus Mueller, Apiida
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...
Executing on API Developer Experience
apidays LIVE Paris 2021 - Who writes the Docs? by Laura Vass, Pronovix
apidays LIVE London 2021 - Presenting the Kubernetes Browser by Daria Muehlet...
INTERFACE, by apidays - Keeping the link between legacy and new by Vince Pad...
INTERFACE, by apidays - Playing with FHIR: Hacking FHIR and mHealth APIs by ...
apidays LIVE Paris - Avoid Building a Microservices Death Star by Przemek Kulik
apidays LIVE Jakarta - Building an Event-Driven Architecture by Harin Honesty...
apidays LIVE Jakarta - Serverless powered Low Code by Alex-Adrien Auger, Sipios
apidays LIVE Paris 2021 - OpenAPI Generator - The Babel Fish of the API World...
The Best of Both Worlds: Introducing WSO2 API Manager 4.0.0
[WSO2Con USA 2018] Nightmare on SSO Street
Ad

Similar to apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes by Xenia Bogomolec, Quant-X Security & Coding GmbH (20)

PDF
Post-Quantum Cryptography - Knowing the Unknown Cyber World | USCSI®
PPTX
Quantum Safety in Certified Cryptographic Modules
PPTX
How Does Advanced Cryptography Secure Our Future
PPTX
Artificial Intelligence and Quantum Cryptography
PPTX
What i learned at gartner summit 2019
PPTX
Data protection on premises, and in public and private clouds
PPTX
PPTX
Quantum computing
PPTX
Practical risk management for the multi cloud
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
PDF
What is Quantum Cryptography and Know How Does QKD Work
PDF
Post-Quantum Cryptography, or how Kai almost hacked a mental health app
PPTX
Red Teaming Generative AI and Quantum Cryptography
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PPTX
Artificial Intelligence and Quantum Cryptography
PDF
1_Introduction.pdf
PDF
Post quantum cryptography in vault (hashi talks 2020)
PDF
Panel 3: Security and Privacy in Practice
PPTX
Post-Quantum Cryptography… or how Kai almost hacked a banking app​
PPTX
Petar Radanliev, PhD Thesis
Post-Quantum Cryptography - Knowing the Unknown Cyber World | USCSI®
Quantum Safety in Certified Cryptographic Modules
How Does Advanced Cryptography Secure Our Future
Artificial Intelligence and Quantum Cryptography
What i learned at gartner summit 2019
Data protection on premises, and in public and private clouds
Quantum computing
Practical risk management for the multi cloud
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
What is Quantum Cryptography and Know How Does QKD Work
Post-Quantum Cryptography, or how Kai almost hacked a mental health app
Red Teaming Generative AI and Quantum Cryptography
Where data security and value of data meet in the cloud brighttalk webinar ...
Artificial Intelligence and Quantum Cryptography
1_Introduction.pdf
Post quantum cryptography in vault (hashi talks 2020)
Panel 3: Security and Privacy in Practice
Post-Quantum Cryptography… or how Kai almost hacked a banking app​
Petar Radanliev, PhD Thesis
Ad

More from apidays (20)

PDF
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
PDF
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
PDF
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
PDF
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
PDF
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
PDF
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
PDF
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
PDF
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
PDF
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
PPTX
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
PPTX
apidays Munich 2025 - Effectively incorporating API Security into the overall...
PPTX
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
PPTX
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
PPTX
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
PPTX
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
PPTX
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
PDF
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
PDF
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
PDF
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
PDF
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
apidays Munich 2025 - Effectively incorporating API Security into the overall...
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Programs and apps: productivity, graphics, security and other tools
Diabetes mellitus diagnosis method based random forest with bat algorithm
Group 1 Presentation -Planning and Decision Making .pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A Presentation on Artificial Intelligence
20250228 LYD VKU AI Blended-Learning.pptx
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A comparative analysis of optical character recognition models for extracting...
Unlocking AI with Model Context Protocol (MCP)
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25-Week II

apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes by Xenia Bogomolec, Quant-X Security & Coding GmbH

  • 1. https:/ /quant-x-sec.com/ | xb@quant-x-sec.com API Protection on Highly Volatile Threat Landscapes
  • 3. 10/28/21 xb@quant-x-sec.com 3 Industrial/Scientific Activities Integration of quantum technologies to classical infrastructures Investigation of open questions in Post-Quantum Security, see https://github.com/Quant-X-Security-Coding-GmbH/QAA_Condition_Number Quantum feasibility studies of algorithmic problems
  • 4. New York JULY Australia SEPTEMBER Singapore APRIL Helsinki & North MARCH Paris DECEMBER London OCTOBER Jakarta FEBRUARY Hong Kong AUGUST JUNE India MAY Check out our API Conferences here 50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees, 300k+ online community Want to talk at one of our conferences? Apply to speak here
  • 5. 10/28/21 xb@quant-x-sec.com 4 The Unique Meaning of Cryptography in Information Security . company a company b Infrastructure & Computing ● SIEM ● IDS/IPS ● Endpoint Protection ● Malware Protection ● Access Controls ● etc. Communication ● Cryptography
  • 6. 10/28/21 xb@quant-x-sec.com 5 Preserving Privacy in the Face of High Performance Attack Vectors Mathematics Computer Science Implementation System Integration Application Integration Network Administration Management Users THREATS Increasing Performance of Binary Technologies New Mathematical Solutions Quantum Computing Cryptography Stack
  • 7. 10/28/21 xb@quant-x-sec.com 6 Overview on High Performance Attack Vectors - Current Threats ● Password and Cryptography Cracking Tools (Hashcat and similar tools) ● Aggregated computing resources and parallelization of attack processes ● New mathematical solutions affecting parameters and configuration of classical crypto Countermeasures Regularly check RFCs and recommendations of official Data Protection and InfoSec institutes for 1) Choice of algorithms 2) Key length 3) Algorithm parameter configuration … and update your systems accordingly in alignment with depending parties.
  • 8. 10/28/21 xb@quant-x-sec.com 7 Overview on High Performance Attack Vectors – Near Future Threats Evolving Quantum Computing Technologies will make it possible to decrypt data encrypted by 1) Diffie-Hellmann 2) RSA 3) Elliptic Curves Timeline: IBM guesses by 2023 Countermeasures 1) New post-quantum crypto algorithms (NIST standardization round 3: https://csrc.nist.gov/Projects/post-quantum-cryptography/round-3-submissions) 2) Homomorphic Encryption (not based on 1) -3) in Threats :-) 3) Quantum Communication (new quantum hardware, expensive)
  • 9. 10/28/21 xb@quant-x-sec.com 8 Identify Assets of High Privacy Criticality by Information Risk Assessment Your Business Processes and the respective IT-systems are your Assets! 1) Perform a CIA-Rating on your systems connected to the APIs. This will indicate the protection need of the APIs. The best candidates for post-quantum cryptography are the ones which process data which needs to remain confidential for many years in the future. The best candidates for a near time transition to homomorphic encryption are the ones with ● High Confidentiality and Integrity Classification ● Low Availability Rating 2) Perform an Information Risk Assessment to consider threats vs. the systems protection need. This will help you to determine which new cryptography you might want to apply to which system. (Guide for conduction IRAs: https://www.nist.gov/publications/guide-conducting-risk-assessments)
  • 10. 10/28/21 xb@quant-x-sec.com 9 X. Bogomolec | Quant-X Security & Coding GmbH | xb@quant-x-sec.com Conclusion Stay aware about upcoming threats and solutions. ...and Introduce swift crypto patch processes! Thank you!!! Find these slides on https:/ /quant-x-sec.com/published.htm (in the section Talks/Presentations at Conferences and Events)
  • 11. New York JULY Australia SEPTEMBER Singapore APRIL Helsinki & North MARCH Paris DECEMBER London OCTOBER Jakarta FEBRUARY Hong Kong AUGUST JUNE India MAY Check out our API Conferences here 50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees, 300k+ online community Want to talk at one of our conferences? Apply to speak here