Previous versions of the study were conducted in 2011 and 2013.
While these reports set the goal of giving an overview of all the major cryptographic solutions used in practice, the 2015 version only contains improvements and updates to the 2013 assessments.
Additionally, several new and more specific areas are covered this time. The report contains the most comprehensive review of elliptic curve cryptography available in Estonian, together with the overview of the extensions of ID-card and mobile-ID solutions for future technological platforms. Questions of what happens to the security of certificates (including root certificates) in case the SHA-1 hash function will be totally broken, and what will remain of the present-day cryptography after a practical quantum computer will be invented were studied. A methodology was provided for evaluation of the costs of replacing broken cryptographic primitives in real life information systems.