CRYPTOMATHIC BLOG

 

Authentication (2)

eba

3 min read

EBA On Customer Authentication Under PSD2: Inherence

A fundamental objective of the Revised Payment Services Directive (PSD2) has been to reduce the risk of fraud to the maximum extent possible and...

Read More

5 min read

W3C's suggestion for a Web Cryptography API

The World Wide Web Consortium or W3C as it is commonly known was founded in 1994 by the original architect of the World Wide Web, Tim Berners-Lee. It...

Read More
Differences between Hash functions, Symmetric & Asymmetric Algorithms

4 min read

Differences between Hash functions, Symmetric & Asymmetric Algorithms

Cryptographic algorithms can be categorized into three classes: hash functions, symmetric, and asymmetric algorithms. This article sheds light on...

Read More
EBA’s opinion on elements of Strong Customer Authentication under PSD2 – Part 2 – Possession and Knowledge

3 min read

EBA On Customer Authentication Under PSD2: Possession & Knowledge

Financial institutions and solution providers are busy implementing the requirements of Strong Customer Authentication (SCA) under the Revised...

Read More

3 min read

Digital Identity: How Social Media Is Changing How We Authenticate

Throughout the last decade, social media has played a vital part in our lives and has significantly shaped the younger generations.

Read More

3 min read

Using 3D-Secure and Device Fingerprints for EMV Payments Against CNP Fraud

Credit cardholders are generally protected from liability if unauthorized transactions are made with their credit cards because of consumer...

Read More

3 min read

HTTPS Encryption & Remote Banking Authentication Attacks

This article discusses the secure HTTPS Protocol intended for web-resources and its principles of operation as well as its strengths and weaknesses....

Read More
Digital Authentication - the basics

5 min read

Digital Authentication - the basics

When it comes to conducting transactions, the possibility of fraud is always a risk that cannot be overlooked. In person, an individual may present...

Read More
The Old Bailey's golden statue of justice see against a cloudy blue sky

3 min read

Do Digital Signatures Provide Non-repudiation?

Non-repudiation is a legal concept that is widely used in information security. It refers to any service which provides proof of the origin of data...

Read More