ID WORLD International Congress: Dr. Peter Kronegger

This site will work and look better in a browser that supports web standards.

middleAbout ID WORLD 2011
middleID People Awards 2011
middleMedia Partners
middlePress Area
middleOther Events:
middleID WORLD Abu Dhabi
middleID WORLD Rio de Janeiro
middleVertical Forums
middleID WORLD 2010
middleID WORLD 2009
middleID WORLD 2008
middleID WORLD 2007
middleID WORLD 2006
middlePast Events

Dr. Peter Kronegger

General Manager – Kronegger

Speaks at ID WORLD on Chip Security

Dr. Peter Kronegger is General Manager of Kronegger GmbH., a start-up company specialized in secure RFID components. The company was founded in 2008 in Graz/Austria.

Formerly he was CTO (chief technical officer) of ACG Identification Technologies. He was responsible for ACG’s RFID reader R&D facility in Graz.

Peter Kronegger acted and acts as a founder, co-founder and investor of several high tech start-up companies. Based in Graz, he started Codekey Identification Systems in 1990 pioneering contactless access control systems. In 1996 Kronegger RFID Systems was founded, generating generic RFID reader components. After the company was merged into ACG, the “ACG Readers” became an industry standard. He was a founding member of Omnikey and co-founded of United Access. He was founding advisor and is member of the supervisory board of Sensor Dynamics, a company specialized on silicon-micro-machine sensors for the automotive market. Currently he is invested in several other high tech start-ups.

Peter Kronegger is a graduate of Ohio/USA (master of science in electrical engineering) and Graz Technical University (PHD in control theory).

He is married, has 2 daughters and is an enthusiastic skier.

“Degrading RFID security – What keys will be broken next?”

Large scale RFID infrastructures frequently need to last 10 years and more. However, considering the progress in technology, computing power and cryptanalysis a perfectly secure system today might not be secure tomorrow. This implies that the lifetime of the system might be much shorter than it was anticipated before the first rollout stage. Another implication is that evolving security flaws might turn out to have more cost impact than everything else in the system.

The presentation summarizes current trends in cryptography, number theory and mathematical attack patterns. The endless road of broken ciphers from Cesar’s cipher via Enigma to DES. How has ciphers been broken in the past ? How are mathematical breakthroughs achieved ? Where can they be expected in cryptography ? Advances in integer factorization. The questionable assumptions on one way functions. Algebraic attacks on stream ciphers. How to break DES. Algebraic attacks on AES. The lack of proof for an unbreakable cipher. The security limits imposed by RFID. Will quantum computers break any code ? Massively parallel computing hardware from the computer shop for everybody and how to use them for code breaking.

Additionally there might be dozens of other vulnerabilities around. What does an attacker need to break a system ? Also, not all threats are real threats. There is an important difference between academic weakness and practical weakness. Lastly because security has a price tag, a careful balancing of measures is necessary.


Speaking on November 17

Access to the Conference requires the payment of the delegate fee: click here

Platinum Sponsor

Gold Sponsors

Silver Sponsor

Standard Sponsor

Morpho Hirsch SCM Jarltech Datalogic