The potential and development of data spaces

Today, companies and individuals alike generate, process and use an immense amount of data, which, according to estimates, will continue to grow worldwide from 64.2 zettabytes in 2020 to an estimated 180 zettabytes in 2025. However, then as now, the global data economy is dominated by individual companies, the so-called BigTechs such as Alphabet, Meta, Amazon and Microsoft. One way to realize data exchange and use apart from the monopolistic BigTechs is based on the concept of trusted data spaces. But what exactly are data spaces and how do they work? This blog post addresses this question and shows a possible target picture for data spaces in Switzerland from the Business Engineering Institute St. Gallen.

Continue reading »

Asymmetric cryptography and digital signatures – Part 2

The first part of this blog series introduced the concept of symmetric cryptography, which can en-sure the confidentiality of data to be exchanged. Symmetric cryptography is based on the funda-mental assumption that the key used, which is to be kept secret, must be transmitted between the communication partners via a secure channel, since otherwise third parties with knowledge of the key can access the ciphertext. Accordingly, with the help of symmetric cryptography, the problem of secret message transmission is reduced to secret key transmission only. To get around this prob-lem, this second part of the blog series presents an introduction to the concept of asymmetric cryp-tography.

Continue reading »