slider

Relentless Pursuit of Innovation to Make Our Lifestyles

in the Digital World More Convenient and Secure

slider

Lead in Providing Secure and Trustworthy Computing Environment

for Everyone and Every Digital Interaction

slider

Be an excellent citizen

Drive customer success

Maintain an innovative spirit

Promote win-win cooperation

slider

Data Security Solutions Protect Authentication and Security Trading

for Hundreds of Millions Users

INDUSTRY SERVICES

WATCHDATA

Watchdata Group is provider of data security solutions, covering a total of 7 overseas branches such as Singapore, France, India. We provide full range of products and solutions which are widely applied to more than 70 countries and regions worldwide.

NEWS

  • 12 2024-10
    Dilithium: The Future of Post-Quantum Digital Signatures

    With the rapid development of quantum computing, traditional public-key cryptographic algorithms like RSA and ECC face the risk of being broken. To address this challenge, the National Institute of Standards and Technology (NIST) initiated the Post-Quantum Cryptography (PQC) standardization project in 2016, aiming to find cryptographic algorithms that can ensure information security in the quantum computing era. After years of evaluation and testing, NIST officially announced three post-quantum cryptographic standards on August 13, 2024, including the Dilithium algorithm. This marks the significant role of Dilithium in future data protection and provides a clear direction for upgrading system security. What is the Dilithium Algorithm? Dilithium is a post-quantum digital signature algorithm based on lattice cryptography. It leverages difficult problems within lattice mathematics, such as Modular Lattice Learning with Errors (LWE) and Short Integer Solution (SIS), which remain challenging to solve even with quantum computers. Dilithium excels in both security and performance,…

  • 30 2024-09
    The ‘Last Mile’ of Digital Operations

    In today’s digital economy, businesses have unprecedented opportunities to innovate product experiences and enhance operational efficiency through digital means. By leveraging digital tools, companies can build agile, intelligent, and automated operational models, improving customer satisfaction and operational efficiency. IoT service providers often need to offer digital-driven platforms and services to their partners. However, the ‘last mile’ challenge in digital transformation usually arises in connectivity management operations. Traditional Connectivity Management SIM (Subscription Identity Module) and its associated data plans should be integrated into the asset management process for IoT companies. Full lifecycle management is required to track when and on which device a SIM is used. In reality, due to the complexity of production, transportation, installation, and maintenance processes, traditional management methods often fail to provide efficient and convenient management for these assets. Digital connectivity Management In recent years, the increasing adoption of eSIM solutions in the consumer electronics industry has highlighted the…

  • 14 2024-09
    What You Should Know About the Kyber Algorithm

    With the rapid development of quantum computing technology, the field of traditional cryptography is facing unprecedented challenges. The public key cryptographic algorithms that we once thought were impenetrable, such as RSA and ECC, have been shown to be vulnerable to quantum computers. As a result, research into cryptographic algorithms that can withstand quantum attacks(Post-Quantum Cryptography, PQC) has become critical for industries that require extremely high security. In this field, the Kyber algorithm, which is notable for its lattice-theory-based design, has been recommended by the National Institute of Standards and Technology (NIST) as an effective Post-Quantum KEM(Key Encapsulation Mechanism) algorithm designed to withstand attacks by quantum computers. What is NIST’s PQC Competition? The Post-Quantum Cryptography (PQC) competition, initiated by the National Institute of Standards and Technology (NIST), aims to identify cryptographic standards that can withstand quantum computing attacks in the future. This competition began in 2016, and after years of evaluation,…

  • 04 2024-09
    Challenges and opportunities arising from the development of quantum technologies

    With the advancement of technology, smart security chip products have evolved from the most common forms like bank cards and telecom cards into various other formats, now integrated into mobile phones, smart home devices, consumer electronics, smart devices, and automobiles. These chips protect the security of identities and transactions through secure encryption algorithms and programs. However, the rapid development of quantum computing technology has introduced new challenges. Some previously considered safe algorithms, such as RSA and ECC, have been proven vulnerable to quantum computers. As a result, industries with high-security demands are paying close attention to research on post-quantum cryptography (PQC). 【Background of the Development of Quantum Technology】 On August 13, the U.S. National Institute of Standards and Technology (NIST) officially released the world’s first three post-quantum cryptography (PQC) standards, with a fourth algorithm standard scheduled for official release by the end of this year. Among the three PQC encryption algorithms published,…

TESTIMONIALS

  • Watchdata has become one of the top suppliers of our telecommunications card. This award represents our recognition of the excellent products and services provided by our company. We are glad to see that this is a company that is impeccable in cost and quality...

    Bharti Airtel, the largest telecom operator in India, operates in more than 20 countries.

    Bharti Airtel, the largest telecom operator in India, operates in more than 20 countries.

  • Thanks to the company's strong support for Huawei's business, Watchdata has created more business opportunities in the blue ocean market thanks to its advanced solutions, innovative delivery processes, fast response times, and professional service teams working closely with Huawei...

    Huawei Technologies Co., Ltd

    Huawei Technologies Co., Ltd

  • Shows their strong expectations and support for technical capabilities, and fully compatibles the PKI USB token with the ICP standard without affecting the transition to product performance. This is Brazil's first PKI USB token product and we are very happy..

    ICP Laboratory of the National Institute of Information Technology (ITI) and LSI-Tec

    ICP Laboratory of the National Institute of Information Technology (ITI) and LSI-Tec