+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Cryptography Within Telcos: Ramping Up Cybersecurity

  • Report

  • 51 Pages
  • October 2024
  • Region: Global
  • IDATE
  • ID: 6009402

Quantum computing poses a significant threat to cybersecurity primarily due to its potential to break widely used cryptographic algorithms. The aim of this study is to analyze the evolution of cyberthreat risks, particularly from the angle of telecoms companies and to highlight the crucial importance of strengthening their cybersecurity in this changing context.

It seeks to answer the following questions:

  • What is the impact and evolution of cybercrime?
  • Why is telco cybersecurity crucial in a digital society?
  • How are cyberthreats currently managed and mitigated?
  • How can the development of Quantum computing disrupt current cybersecurity?
  • What initiatives are governments and telcos taking in the race for Quantum computing?
  • What solutions are available to protect an organization in the Quantum era?
  • What is the market potential for Quantum-safe cryptography solutions?

Table of Contents


1. Executive Summary
2. Consumer e-SIM ecosystem
2.1. Definition of consumer e-SIM
2.2. Why has e-SIM still not been democratised?
2.3 Market sizing of the consumer mobile in Europe
2.4. Market sizing of the mobile consumer in North America
2.5. Market sizing of the consumer mobile in Latin America
2.6. Market sizing of the mobile consumer in Asia-Pacific
2.7. Market sizing of the consumer mobile in the MEA region
2.8. Dynamics of the consumer e-SIM market
2.9. Advantages & disadvantages of consumer e-SIM

3. e-SIM M2M / IoT ecosystem
3.1. Definition of M2M / IoT e-SIM
3.2 Market sizing of the M2M mobile in Europe
3.3 Market sizing of the M2M mobile in North America
3.4. Market sizing of the M2M mobile in Latin America
3.5. Market sizing of the M2M mobile in Asia-Pacific
3.6. Market sizing of the M2M mobile in the MEA region
3.7. M2M / IoT e-SIM Market dynamics
3.8. Advantages & disadvantages of M2M e-SIM

4. Telecom operators and e-SIM manufacturers
4.1. Telecom operator use cases
4.2. Telecom operators by revenue
4.3. e-SIM solution providers by revenue

5. e-SIM use cases
5.1. e-SIM use case: Automotive
5.2. e-SIM use case: Item tracking, shipping and logistics
5.3. e-SIM use case: Intelligent energy
5.4. e-SIM use cases: Portable devices
5.5. e-SIM use case: Intelligent agriculture
5.4. e-SIM use case: Smart Home Security

6. I-SIM
6.1. Definition of i-SIM
6.2. Advantages of i-SIM over e-SIM

7. Market sizing
7.1 Global value of the e-SIM market

List of Tables
1. The Stake of Cybercrime
  • Number of internet users 2005-2023
  • Total number of IoT units worldwide, 2001-2030 (billion units)
  • Volume of data created and replicated worldwide, 2010-2025 (Zettabytes)
  • Location of storage of breached data, 2023
  • Average cost of a data breach, 2017-2023 (million USD)
  • Estimated global cost of cybercrime, 2018-2025 (trillion USD)
2. The Importance of Telcos Cybersecurity
  • Fixed & Mobile broadband traffic, 2019-2022 (in exabytes)
  • Global growth of interconnection bandwidth, 2022-2026 (terabytes per second)
  • Breakdown of supply chain risk
  • Examples of cyber-attaches against telcos
3. Cryptography and Threat Mitigation
  • Different types of encryption
  • Main cybersecurity threats for telecommunications
  • Methods to reduce the risk of cyber threats
4. Future Challenge in Cybersecurity
  • The Internet encryption system
  • Quantum computing: main threats
  • Transition process to post-Quantum cryptography
  • Solution to build a post-Quantum secure system
  • International initiatives related to the Quantum challenges
5. The Quantum Computing Race
  • Volume of investments mobilized in the year indicated, billion USD
  • Public funding for Quantum computing and related technologies to July 2023
  • Profiles of Quantum technology start-ups
  • National Quantum technology programs
  • Telco initiatives in Quantum technologies
6. Post-Quantum Solution Providers
  • SandboxAQ activity
  • SandboxAQ AQtive Guard Architecture
  • Vodafone and SoftBank Case Studies
  • IBM activity
  • IBM Quantum Safe Technology
  • Roadmap of IBM Quantum Safe Technology
  • ISARA activity
  • ISARA Advance Dashboard
7. Market Sizing
  • Revenues from Post-Quantum Cryptography 2024-2030
8. Recommendations for Telcos
  • Steps to anticipate Quantum risk

Samples

Loading
LOADING...

Companies Mentioned

  • 1Qubit
  • Airbus
  • AIT
  • Alice & Bob
  • ANSSI
  • AT&T
  • AWS
  • BT
  • Cisco
  • CryptoExperts
  • CryptoNext Security
  • Deutsche Telekom
  • D-Wave
  • Entrust
  • ESA
  • Fujitsu
  • Google
  • GSMA
  • HPE
  • IBM
  • IDQuantique
  • InfiniQuant
  • Inria
  • Intel
  • IonQ
  • ISARA
  • KETS
  • KPN
  • Linux
  • Lumen
  • MásMovil
  • Microsoft
  • NASA
  • NIST
  • NSA
  • NTT
  • NVIDIA
  • Optus
  • Orange
  • PASQAL
  • PQshield
  • PsiQuantum
  • Quantinuum
  • Quintessence Labs
  • QuantumCTek
  • QuantumXchange
  • QNU Labs
  • QuSecure
  • Rigetti
  • SandboxAQ
  • SK Telecom
  • SoftBank
  • SQC
  • Telefónica
  • Telstra
  • Thales
  • TheGreenBow
  • T-Mobile
  • Toshiba
  • Verizon
  • Vodafone
  • Xanadu

Methodology

Loading
LOADING...