2 min read
CRYPTOMATHIC BLOG
5 min read
Securing Remote ID Verification: Steps to Combat Video Injection & Session Attacks
Remote identity verification is facing a more complex class of fraud attacks than many organisations are prepared for. Deepfakes receive most of the...
4 min read
PQC Device Binding: Enhancing Mobile Trust and Reducing Fraud Risks
Cryptomathic is excited to announce the introduction of its most advanced and efficient device binding protocols based on PQC Algorithm. This is a...
1 min read
Solid8 Technologies and Cryptomathic Partner to Strengthen Crypto-Agile Security Across Southern Africa
As quantum computing progresses from theory toward real-world capability, organizations across regulated industries are reassessing the strength and...
4 min read
The Strategic Importance of Qualified Electronic Signatures in Banking
The Strategic Importance of Qualified Electronic Signatures in Banking Qualified Electronic Signatures (QES) are no longer just a legal formality but...
5 min read
Securing Web Steps in EUDI Wallet Journeys: Best Practices and Strategies
European Digital Identity (EUDI) Wallet programs are often described as mobile-first. And in many ways, they are: the wallet app is where credentials...
1 min read
REGnance and Cryptomathic Partner to Accelerate Quantum-Safe Transformation for Regulated Enterprises
As quantum computing advances from theory to practical reality, organizations -particularly in regulated industries - face an urgent need to reassess...
1 min read
Cryptomathic Welcomes Armel Corre as Regional Sales Director
Cryptomathic is pleased to announce that Armel has joined the company as Regional Sales Director, leading the development of our newly established...
5 min read
Post-Quantum Readiness for Mobile Banking: Why CBOM and Crypto Agility Matter for DORA (Part 2)
This is Part 2 of the series.
4 min read
Post-Quantum Readiness for Mobile Banking: Why CBOM and Crypto Agility Matter for DORA (Part 1)
Mobile banking apps now sit on the front line of operational resilience. They rely on cryptography for almost everything that matters - user...
2 min read
Cryptomathic Partners with Unsung to Deliver Enterprise Key Management and PKI Solutions
Cryptomathic is proud to announce Unsung into the GEM partner programme.
2 min read
What TSPs Must Prioritise in Digital Signatures in 2026
4 Execution Priorities for Trust Service Provider Managers By 2026, trust service providers (TSPs) sit at the centre of Europe’s digital trust...
4 min read
What CISOs Must Prioritise in Mobile App Security in 2026
For a lot of organisations, the mobile app has become the main front door. It’s where customers log in, approve payments, sign things, and access the...
6 min read
6 Practical Steps to Crypto-Agile Post-Quantum Cryptography in 2026
How Banks And Payment Providers Can Turn Regulatory Timelines Into A Crypto-Agility Advantage In 2026, post-quantum cryptography (PQC) moves from...
5 min read
Why eIDAS Certification is Essential for Today’s Trust Service Providers
For Trust Service Providers, banks and governments, eIDAS is no longer just another regulation in the stack. It defines who is trusted, for what, and...
10 min read
Quantum-Resistant Transition with OpenSSL 3.5
OpenSSL 3.5 brings the first NIST-standardized post-quantum algorithms into the mainstream OpenSSL toolkit: ML-KEM (key exchange), ML-DSA (lattice...
5 min read
How to choose a TSP technology vendor for QES, seals, timestamps and PKI services
Selecting the right Trust Service Provider (TSP) vendor is vital for any organisation that issues or relies on Qualified Electronic Signatures (QES),...
4 min read
eIDAS 2.0 Implementing Acts: A Clearer Path for Trust Service Providers
With eIDAS 2.0 now in effect, Trust Service Providers across the EU are facing a complex rollout of implementing acts that define the practical...
5 min read
Fintech Compliance Made Easy: PCI DSS and NIST Standards Without Headaches
Compliance in fintech is anything but straightforward. Between the Payment Card Industry Data Security Standard (PCI DSS) and the National Institute...
2 min read
OWASP MASVS Verified: Cryptomathic MASC Meets All Applicable Controls
Cryptomathic has completed an independent security assessment of the Mobile Application Security Core (MASC) with NowSecure. The engagement covered...
5 min read
QTSP vs TSP: Understanding Digital Trust Services and eIDAS
Understanding TSPs, QTSPs, and the Importance of eIDAS Regulation for Digital Trust Services In today’s digital economy, trust is the cornerstone of...
2 min read
Make Microsoft Office Trustworthy at Scale with CK360
Microsoft 365 is the backbone of business productivity, but it also remains one of the most heavily exploited attack surfaces. Business email...
2 min read
Challenges of PQC Migration and Cryptographic Compliance for Financial Institutions
Post-quantum cryptography (PQC) is no longer a theoretical concern. With standards finalized and regulatory frameworks such as DORA, PCI DSS 4.0, and...
3 min read
Countdown to compliance: DORA is live, PCI DSS 4.0 is in force, and PQC readiness for financial institutions
Financial institutions are facing an unprecedented convergence of compliance pressures and technological challenges. With the European Union’s DORA,...
1 min read
Cryptomathic Appoints Jesper Celano as Chief Financial Officer to Support Global Expansion
Cryptomathic is proud to welcome Jesper Celano as Chief Financial Officer. With a distinguished background in financial leadership and a deep...
5 min read
Google Play Protect vs. MASC: Approaches to Mobile Malware Protection
A question often arises: if a device already has Google Play Protect (GPP) – Android’s built-in malware protection – what extra value does MASC...
1 min read
EU Mandates Post-Quantum Cryptography by 2030 – Five Years Ahead of US
The EU and US now agree on which post-quantum algorithms to use – NIST FIPS 203/204/205 – but not when they must be deployed.
2 min read
Cryptomathic's QSCD Signer SAM v6.0 Achieves Qualification in Spain’s CPSTIC with ENS High Certification
We are excited to announce that Cryptomathic's QSCD Signer SAM v6.0 has been officially qualified by the Spanish “Centro Criptológico Nacional” (CCN)...
4 min read
Cryptographic Key Management in 2025 and Beyond
Cryptographic Key Management Regulation As we move further into an era of digital transformation, cryptographic key management has emerged as a...
3 min read
Overcoming Payment Card Issuance Challenges: Key Trends and Solutions
As the payment landscape continues to evolve, organizations are under mounting pressure to deliver secure, scalable, and compliant card issuance...
5 min read
Organizations Prepare for Quantum Security (PQC)
*Cryptomathic - originally published 16 May 2023; Updated 20 May 2025* Quantum computers offer transformational power for complex computational...
4 min read
Securing Mobile Banking Apps in 2025: The Role of Emulator Detection
Attacks on mobile banking and payment applications frequently begin with the use of an emulator for the mobile operating system, where the targeted...
2 min read
EUDI Wallets & Trust Services: The Future of Digital Identity and Signatures in eIDAS 2
In our Part 1 blog, we explored how eIDAS 2.0 marks a transformative shift for Trust Service Providers (TSPs) across Europe. In this follow-up, we...
3 min read
Interoperability & Scalable Architecture Under eIDAS 2
The evolution from eIDAS 1to eIDAS 2 brings profound changes for the European digital trust ecosystem — notably, an emphasis on interoperability,...
1 min read
Document Sealing: Cryptomathic's New Remote Sealing Solution
This week Cryptomathic launched a new remote qualified sealing offering.
2 min read
HQC Selected for PQC Standardization by NIST
There has been a lot of buzz about the advancements in quantum computing recently from Google, Nvidia, and Bill Gates.
3 min read
How Cryptomathic’s MASC Strengthens Mobile Payments and Ensures PCI DSS and PSD2/3 Compliance
With the increasing adoption of mobile banking and payment apps, financial institutions face greater challenges in securing cardholder data. The...
3 min read
5 Critical Steps to Secure Mobile Wallets: Lessons from Hardware Security
Whether you’re tapping to pay at a coffee shop, or sending money to a friend, or even providing identification, mobile wallets have become the go-to...
3 min read
How Generative AI is Transforming Cyber Threats & How to Stay Secure
For an internal event atCryptomathic, we invited some our clients from the financial and trust service sectors to share their insight on future...
4 min read
How to build a PCI MPoC v1.1 solution based on Cryptomathic’s Mobile Application Security Core (MASC) Software
The primary objective of the PCI MPoC (Mobile Payment on COTS) standard is to ensure that robust security mechanisms are in place for secure mobile...
1 min read
Cryptomathic & Infosec Global announce strategic partnership
The new partnership aims to create a seamless process for companies to discover, inventory, and manage cryptographic assets.
3 min read
The Strategic Importance of DORA Compliance for U.S.-Based BFSI Companies
The Digital Operational Resilience Act (DORA), set to become fully enforceable on January 17, 2025, represents a significant evolution in the...
1 min read
Cryptomathic names new Global Head of Partnerships to drive innovation and collaboration
Cryptomathic is thrilled to welcome Marianne Van Der Pluym to the team as Global Head of Partnerships. With her extensive experience and proven track...
4 min read
Mobile Security: The Weaknesses of Secure Elements and Enclaves
Secure elements (SE) on Android and secure enclaves on iOS have emerged as trusted hardware-backed solutions for storing and protecting sensitive...
3 min read
Cryptomathic Innovates in mobile security by extending its MASC solution with an Insights Service -Reaction Engine
Cryptomathic is thrilled to announce a significant enhancement to our Mobile App Security Solution (MASC) offering with Insights Service. Insights...
4 min read
Choice of app protection approach affects how well protected an app is
The choice of app protection should not be taken lightly. Modern applications face numerous threats that evolve alongside advancements in...
1 min read
Unveiling Obsidian: Next-Gen Payment Platform for the Cloud Era
We are delighted to announce the launch of Obsidian payment platform, a cutting-edge digital payments solution for issuers designed to meet the...
7 min read
Quantum-Resistant Certificates: Why They Matter
Short-lived certificates play a vital role in current infrastructures, finding a suitable quantum-resistant alternative to the currently used...
2 min read
Cryptomathic & PQShield: Partnering for PQC Solutions in Code Signing
Two foremost software security experts and pioneers in cryptographic agility and post-quantum cryptography join forces to offer comprehensive,...
4 min read
The EUDI Wallet Certification Process: Key Challenges
As the European Union solidifies the framework for the EUDI (European Digital Identity) wallet, the certification process outlined in the...
6 min read
Qualified Electronic Signatures: Best Practice Implementation of SAM
This article evaluates the implementation options for the Signature Activation Module (SAM) in the context of eIDAS 2. Based on this analysis we...
2 min read
Hard Truths About Hardware: EUDI Wallet Needs More Than Secure Chips
Mobile phones are increasingly vulnerable to hacking and fraud, presenting significant challenges for securing sensitive applications like the EUDI...
2 min read
Reviewing the EUDI Wallet Reference Implementation Code
The EUDI wallet reference implementation serves as a practical guide for developers to create secure digital identity management solutions based on...
3 min read
Key Vulnerabilities of the EUDI Wallet Solution Reference Architecture
The EUDI (European Digital Identity) wallet solution reference architecture (ARF) is designed to provide a secure framework for managing digital...
2 min read
Cryptomathic Signer & KeyCloak Integration for eIDAS-Compliant Signing
To deliver trust services, managing user´s identities and access is paramount. eID schemes and trust service providers all require IdP solutions for...
3 min read
7 Top strategies to secure mobile-first consumer-driven banking
North America is catching up fast to the open banking initiatives that are currently thriving across Europe, South America and Asia Pacific. As...
1 min read
Cryptomathic Welcomes Edmundo Diaz as New Sales Director
Cryptomathic is delighted to welcome Edmundo Diaz as its new Sales Director for Southern Europe, Africa and Latin America (LatAm). Edmundo’s...
1 min read
Enhance Azure Data Security: External Key Management & BYOK
Data security can be complex, but it's essential in today's business world, especially when using cloud services. One effective approach is adopting...
1 min read
New Sales Director Joins Cryptomathic North America Team
Cryptomathic further bolsters its leadership team, welcoming Davin Cooke as Sales Director for the company’s North American operations.
2 min read
Readiness through HSM and Post-Quantum Key Management
In today's fast-evolving digital landscape, robust key management has become an essential part of securing sensitive data and communications. The...
1 min read
BOSA Secures Belgian Digital ID with Cryptomathic MASC
Cryptomathic’s Mobile App Security Core (MASC) delivers the highest levels of security, protection and privacy for citizens using the app
4 min read
Key Management in Automotive Cybersecurity
Today’s cars are computers on wheels which operate in a connected world and ecosystem of other cars, roadside infrastructure, and the cloud. Car...
1 min read
Cryptomathic Welcomes Chief Revenue Officer
Cryptomathic is delighted to announce the appointment of Anna Russell as Chief Revenue Officer (CRO).
4 min read
Exploring DORA: Key Insights for Financial Compliance
Cryptomathic solutions support your financial institution towards compliance. The financial sector is increasingly dependent on technology and tech...
1 min read
Signer 6: A Game-Changer in Digital Signing Solutions
signer 6 enables future-proofed, scalable digital signing to support the upcoming european digital identity wallet (eudi) We are delighted to...
3 min read
NIS2 implementation in the EU: Status & Current Affairs
EU Directive 2022/2555 on Network and Information Systems, also known as NIS2, entered into force on Jan 16, 2023 and the Danish implementation Act -...
4 min read
Steps to Achieve State-of-the-Art Protection for Your Mobile Apps
In today's digital landscape, ensuring the security of your mobile applications is paramount. Cryptomathic's Mobile App Security Core (MASC) is at...
2 min read
Mobile Point of Sale Compliance – What is it all about?
PCI have recently released the new standard and compliance program for Mobile Payments on Commercial off-the-shelf devices (MPoC). This blog is the...
2 min read
eIDAS 2.0: What's New in the Updated Regulation?
The European eIDAS regulation, short for the Electronic IDentification, Authentication and Trust Services Regulation, was created in 2014 to ensure...
2 min read
Demystifying Mobile Application Hardening: Techniques & Best Practices
What is Mobile Application Hardening? Mobile application hardening refers to the process of securing mobile applications against various threats and...
2 min read
More Post-Quantum Digital Signature Candidates!
On July 17, 2023, the National Institute of Standards and Technology (NIST) announced a new set of 40 candidates to compete in their Post-Quantum...
3 min read
Cloud Data Security: Why Centralized Key Management is Vital
In today's digital era, banks are increasingly leveraging cloud and multi-cloud environments to drive operational efficiency. However, the security...
2 min read
The European Digital Identity Wallet as a Means of Authentication
The European Commission, as part of the eIDAS 2.0 proposal promotes the European Digital Identity Wallet (EUDI Wallet) as an app that enables...
3 min read
AWS External Key Store: Crypto Gateway Integration
AWS Key Management Service (KMS) has long provided cryptographic services to safeguard your AWS resources. This involves generating and managing keys...
3 min read
Cybersecurity Paradox: Too Many Solutions Makes You Less Secure
Believing that more cybersecurity solutions increase safety is a common misconception. An overload of security measures can ironically generate more...
4 min read
Improving Cloud Key Management with the Enclave Security Module
When organizations make the strategic decision to shift their applications and infrastructure onto the cloud, they face a myriad of challenges. These...
7 min read
Top 10 Mobile App Security Threats and How to Protect Your Data
The ubiquity of mobile applications has made them part of our day-to-day lives, but with the increased use comes the risk of potential security...
7 min read
What is an Electronic Signature? How It Differs from Digital Signatures
Were I to ask you what a handwritten signature looks like, with an air of confidence will you grab a pen and scrawl your name on a piece of paper,...
4 min read
Using EUDI Wallets for Secure Digital Payments
The European Digital Identity Wallet (EUDI Wallet) is at the forefront of the European Commission's eIDAS initiative to establish a secure and...
4 min read
How FinTech is Helping Build a More Sustainable Financial Future
Along with the increased convenience and security offered by digital payment technology, many consumers are now showing greater interest in...
5 min read
The Evolution and Benefits of Zero-Trust Security
The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires...
4 min read
Cryptomathic's Mobile App Security Core for EUDI Wallet protection
The European Digital Identity (EUDI) Wallet is set to become a cornerstone of digital trust across the EU. In 2025, as the first production wallets...
1 min read
Banks Ask EU to Reconsider Payments in EUDIW Legislation
The European Digital Identity Wallet (EUDIW) has the potential to serve as a comprehensive identity gateway, enabling individuals to manage their...
3 min read
Bring Your Own Key (BYOK) in Your Company’s Data Security Strategy
The adoption of cloud computing has altered the approach organizations take toward security. Rather than concentrating on securing the perimeter of a...
4 min read
Why Is Zero Trust Important for Digital Business Environments
Zero Trust security is a concept that has been discussed extensively. However, there are many different interpretations of what it means. Some...
2 min read
New Partnership Between Cryptomathic and Fidentity
Cryptomathic is excited to announce that we have partnered with fidentity, an expert in online identity verification, to enable automated identity...
6 min read
Resources to Help You Develop and Test EUDI Wallet App Security
Itemizing the potential risks of the European Digital Identity (EUDl) Wallet scheme is a complex task that involves assessing the attack surface of...
3 min read
Threats to the EUDI Wallet App
The European Digital Identity wallet (EUDI wallet) is proposed by the European Commission to provide a secure, safe and standardized digital identity...
5 min read
Exploring Payment Fraud Trends in 2023
Merchants must remain vigilant against fraud and ensure they have the necessary tools to combat it. Failure to do so may render their fraud detection...
4 min read
Will Cyberattacks Cause the Next Financial Crisis?
The recent instability of a major bank that catered to US tech startups caused concern for several prominent tech companies and venture capitalists,...
5 min read
Encryption for GDPR Compliance
Under the GDPR, organizations must take appropriate measures to protect personal data from unauthorized access, use, disclosure, or destruction. One...
6 min read
Outline of the Players in the EUDI Wallet Ecosystem
The European Digital Identity (EUDI) Wallet aims to offer digital wallets to all EU citizens and businesses for identification purposes and document...
5 min read
How Assurance Protocols Enhance Mobile App Security
Mobile apps and mobile software components are rarely stand-alone as they frequently perform their most important operations on various backend...
4 min read
PQC & Crypto-agility: Protect Against Steal Now, Decrypt Later
Large-scale quantum computing is coming soon, and with that comes new cybersecurity threats. One of these threats is "steal now, decrypt later,"...
2 min read
HSM remote key loading using CKMS and PCI-certified KLD
Hardware security modules (HSMs) are physical devices that provide cryptographic functions such as encryption/decryption and digital signing. They...
5 min read
Key Cybersecurity Trends to Watch in 2023 and Beyond
Each year, various events within the cybersecurity industry have a significant impact on the industry, leading experts to predict an increase in the...
2 min read
Preparing For Post-Quantum Cryptography In 10 Steps
With post-quantum technology having the potential to trigger a new wave of cyber threats, we identify 10 steps that organizations should take to...
4 min read
Will the UK Follow EU Standards on Digital Identities?
The UK's relationship with the EU has been tumultuous in recent years, especially in the wake of Brexit. With regards to digital identities, former...
4 min read
Exploring The EMV Personalization Process
EMV Personalization of a payment card is the process of writing data to the card in order to make it ready for use. This includes loading the card...
5 min read
Protecting the European Digital Identity Wallet
The European Commission promotes the European Digital Identity wallet (EUDI wallet) as part of its effort to digitize the economy and help foster...
4 min read
How BYOK Ensures Schrems II Compliance for AWS Data
Companies who use Amazon Web Services (AWS) often choose to do so because of its scalability, ease of use and lower costs than other services or...
2 min read
NIST Boosts Small Device Security with Lightweight Cryptography
Security experts from the National Institute of Standards and Technology (NIST) have declared Ascon - a group of cryptographic algorithms - as the...
3 min read
Ensuring Secure BYOK for AWS S3 Bucket Operations
Keeping data safe in the Cloud has always been a concern for users, hence the need for encrypting data. With more businesses taking advantage of what...
4 min read
Payment Security & Key Management: The Four Corners Model
The “Four Corners” model, also called the “Four Party Scheme”, is utilized in almost all standard card payment systems across the globe. Here, we...
3 min read
Get Quantum-Ready with Crypto Service Gateway
When it comes to preparing for post-quantum computing, the legacy mechanisms for effective implementation, integration, and management of...
4 min read
Setting Up Digital Signing Services: Key Steps Involved
Digital transformation has been a critical focus for businesses and institutions prior to the pandemic. Digital documents and e-signatures are a...
3 min read
Cryptomathic’s AWS BYOK Service: Providing Industry Grade Compliance
The AWS cloud is enjoying increasing popularity with its very high levels of scalability, durability, and availability. It releases companies from...
8 min read
Cybersecurity for connected vehicles
Vehicles today come with an array of convenience and safety features driven by software. This means that the cybersecurity of these vehicles must now...
3 min read
EMV Personalization cryptographic requirements
EMV Personalization is a process used to get card data into cards, mobile phones, and wearables. The process includes a variety of complicated...
3 min read
Cryptomathic AWS BYOK: Secure Scalability, Durability & Availability
In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must...
3 min read
How BYOK Secures AWS S3 Storage Services
Cloud storage via AWS Storage Services is a simple, reliable, and scalable way to store, retrieve and share data. As a third-party cloud vendor, AWS...
3 min read
Why BYOK is Essential for Data Security and Privacy in the Cloud
The 2020 Oracle and KPMG Cloud Threat Report focuses on the key risks and challenges organizations face as they implement and maintain cloud...
3 min read
How Prepared are Companies for Quantum Computing Cybersecurity Risk?
This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current...
5 min read
Mobile Banking App Security: Malware Protection Insights
To bank safely online, you need additional mobile app security mechanisms that go beyond standard OS security features. In this article, we take an...
3 min read
Mobile Banking Application Protection: Challenges and Techniques
As the use of mobile phones for mobile banking and payment applications increases, so too do the security threats. Most smartphones use only two...
4 min read
TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles
Among all the various key block formats, the TR-34 format is undoubtedly one of the most sophisticated. The TR-34 norm is an implementation of the...
3 min read
EU AWS Hosting: Navigating Data Sovereignty & GDPR Compliance
This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.
3 min read
The Java ECDSA Vulnerability: What You Need to Know
On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.
3 min read
FAQs on PCI PIN Key Blocks & Their Requirements
This article proposes a few answers to a series of frequently asked questions (FAQs) about key blocks and their use with PCI.
3 min read
What's a Secure Signature Creation Device (SSCD)?
As defined by Regulation (EU) No 910/2014 (eIDAS), which took effect on 1 July 2016, an electronic signature creation device is software or hardware...
5 min read
Crypto Service Gateway: Enabling Crypto-Agility with CSG Policy Engine
Today's businesses rely heavily on cryptography to authenticate people and processes, secure communications, and safeguard critical data.
4 min read
EMV Payment Security - Acquirers
In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating...
3 min read
Digital vs Wet Signatures: The Impact of Forgery On House Buying
Mortgage fraud is a serious crime. Once executed and signed, a mortgage deed is a legally binding contract. The responsibility of trying to prove...
5 min read
E-Government Authentication & Signing: Centralized Solutions
Achieve Non-Repudiation of Origin (NRO) and Non-Repudiation of Emission (NRE)
5 min read
Classification of Cryptographic Keys
This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...
3 min read
How EMV Payment Security Works for Issuers
An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...
3 min read
Challenges in Key Management for EMV Personalization
The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in...
2 min read
Understanding Key Block Formats and Applications
A key block is a unique piece of cryptography that is used to protect cryptographic keys while they are being sent over networks that might not be...
4 min read
An Expert Introduction to z/OS & IBM Cryptographic Architecture
IBM’s mainframe computers have been a rock-steady part of banks’ security infrastructure for many years. Originating from the local data-center...
3 min read
Introducing the Signature Activation Protocol for Remote Signing
This article explains the digital Signature Activation Protocol (SAP) in the context of eIDAS-compliant central signing. It sheds light on its...
4 min read
How Tokenization Secures Mobile Payment Applications
The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. Analysts...
4 min read
Improving Performance & Scalability with Remote Electronic Signatures
National digital signature schemes that utilize remote electronic signature technology can achieve very high usage rates, whereas Trust Service...
3 min read
The Importance of Banking-grade Key Management for IBM CCA
The IBM Common Cryptographic Architecture (CCA) is a cryptographic platform providing several functions of special interest for securing financial...
2 min read
NIST Post-Quantum Cryptography: SIKE’s Standardization Failure
Just a month ago, NIST announced its selection of three digital signature algorithms and one key establishment mechanism (KEM) for future use in...
3 min read
Advantages of Centralized Key Management
Traditionally, end-to-end lifecycle key management was achieved through inefficient paper-based procedures and highly resource intensive tasks...
3 min read
7 Tips for Correct Encryption Usage in eGovernment Processes
Encryption has become the most essential part of securing data online. The biggest headache to the Cybersecurity industry is a data breach. The last...
3 min read
How to Deploy and Manage Cryptography in a Project the Right Way
With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...
2 min read
What You See is What You Timestamp: Alternative to QES
In this article, we proposeWhat-You-See-Is-What-You-Timestamp (WYSIWYT) as an attractive alternative to Qualified Electronic Signatures, for certain...
5 min read
Electronic Signatures: Which Industries Must Use E-Signatures?
Certain industries have a duty to protect confidential information, as well as a requirement for authentication - proving that a document was sent by...
3 min read
NIST Quantum-Resistant Crypto Standards Released: Act Now
An over five-year-long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of...
2 min read
Key Block Conversion: Techniques, Methods & Examples
There are several types of key block formats used in different industries, especially the retail banking industry. The systems that use these key...
3 min read
Integrating PSD2 and eIDAS: Streamlining Compliance
With the introduction of PSD2, banks are forced to provide third party payment service providers (PSPs) with access to the bank’s customers’ account...
5 min read
Resolving Common Pain Points of Key Management
Many organizations struggle with cryptographic key management for multiple reasons. However, these pain points can be resolved with the right tools.
4 min read
EMV Payment Security for Cardholders: Overview & Practices
Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment...
2 min read
Creating eIDAS-Compliant Printouts of Digitally Signed Documents
This article describes a model that could enable an electronically signed document to be printed out and used as an original in legal proceedings, in...
3 min read
Mobile Banking Security: Data Obfuscation Techniques
Code obfuscation is one of the most effective techniques for protecting sensitive data in mobile banking and payment apps. However, it's not always...
5 min read
Qualified Digital Signing and Electronic Signature UK Law
This article aims to demystify electronic signature UK law and explain how it supports all types of electronic transactions in accordance with UK...
7 min read
BYOK, CYOK, HYOK: Cloud Key Management Explained
Last Updated: 20 October 2025
8 min read
Distributed Authentication under PSD2: Explained
PSD2 breaks up the ways in which banks do their business, by forcing them to open up their APIs. By doing so, PSD2 challenges the way in which data...
3 min read
Crypto-agility: The Gold at the End of the Rainbow for NIST PQC
Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...
3 min read
Integrating eIDAS Qualified Remote Signing Tools with Your Systems
The demand for remote digital signatures to enhance security and customer experience continues to grow across the EU, as the banking and financial...
2 min read
ANSI X9.24-1-2017: Key Replacement, Destruction, and Archiving
One aspect of key management is dealing with what happens when a symmetric cryptographic key is no longer needed. The section ‘Key Replacement,...
3 min read
The Four Pillars of eIDAS: A Comprehensive Overview
The eIDAS regulation sets the standard for electronic identification, electronic signatures, and trust services. It paves the way for delivering...
3 min read
Digital Identity and eIDAS in Banking
The eIDAS Regulation lays the groundwork for creating a robust digital identity framework. The idea is to provide EU citizens with a secure, robust...
3 min read
Key Management Challenges in Financial Symmetric Cryptography Systems
This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...
2 min read
ANSI X9.24-1-2017: A Guide to Key Loading Standards
The ANSI X9.24-1-2017 standard defines the requirements for the loading of key components or shares, and the loading of cleartext keys. The loading...
4 min read
NIST PQC Finalists Update: It’s Over For The Rainbow
Last month, one of the three NIST finalists for post-quantum signature schemes received its final nail in the coffin: Ward Beullens, a PostDoc at IBM...
2 min read
UK eIDAS & EU eIDAS: Implications for Cross-Border Transactions
The eIDAS Regulation (No 910/2014) (EU eIDAS) came into force in 2016. It created a Europe-wide legal framework for electronic identification,...
5 min read
Crypto-Agility in the Advent of Post Quantum Computing
There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...
2 min read
NIST's Post-Quantum Cryptography Standardization Process
Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...
2 min read
Q: What's in a Logo? A: Mathematics Behind the Design
Maybe you have wondered where our logo comes from and what it actually means. If you have, we hope the following will answer these questions. Just as...
2 min read
Emulator Detection: Key for Mobile Banking & Payment App Security
Attacks on mobile banking and payment applications frequently begin with the use of an emulator for the mobile operating system, where the targeted...
6 min read
How to Enable Legally Binding Mobile E-signatures On Your device
The ever-growing number of applications and uses for mobile devices has long been a hot topic. Using mobiles to electronically sign transactions and...
2 min read
eIDAS and PSD2 – A perfect symphony in the digital marketplace?
The European Union is leading the way in the move towards the creation of a single digital market. There are many advantages a digital business has...
6 min read
Managing Risks in Cryptographic Key Management
With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...
2 min read
Control Your Key in the Microsoft Azure Key Vault
Microsoft’s Azure Key Vault Managed HSM allows customers to safeguard their cryptographic keys for their cloud applications and be...
3 min read
Payment & Banking Cryptography: Benefits of z/OS & Z Platform
This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for...
2 min read
Meltdown & Spectre: What You Need to Know About Key Protection
A number of serious security vulnerabilities, collectively known under the names of “Meltdown” and “Spectre” [1][2], have recently been discovered in...
3 min read
eIDAS Regulation & European Interoperability Framework Explained
The European Interoperability Framework (EIF) adopted in 2017 is the primary thrust in the EU’s effort to improve the efficiency of public service...
3 min read
Optimizing eIDAS with Digital Signature Deployment Models
The eIDAS regulation provides both the technical and legal framework for electronic identification and digital signatures that the banking sector...
4 min read
Common Key Management System Models for the Cloud
This article explains the four primary cloud KMS pattern combinations and which are best suited for use with Cryptomathic’s Key Management System...
3 min read
eIDAS Trust Services – Strengths and Challenges in Implementation
A study published in early 2018 by the European Union Agency for Network and Information Security (ENISA), revealed that 90% of the respondents...
3 min read
Why Key Management Systems Require X9.24/TR-31 Blocks
The PCI Council requires most actors of payment networks to implement ANSI X9.24/TR-31-compliant key blocks to wrap and securely transmit, transfer,...
2 min read
What is the right user interface for a Key Management System?
User interface design and usability are the deciding factors in attaining a good user experience for most IT deployments, including key management...
3 min read
Understanding BYOK: Bring Your Own Key Explained
Bring your own key (BYOK) is a popular term relating to key management for cloud applications. However, a lack of standardization makes it confusing...
3 min read
IBM z15 Mainframe: Key Management & Resilience
Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...
4 min read
How Tokenization Reduces Payment False Declines
This article discusses how tokenization may reduce false declines with credit card transactions that could negatively impact merchants.
3 min read
Crypto-Abstraction Layer: What You Need to Know
A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...
2 min read
FAQs on Cryptographic Key Blocks and Their Use
This article proposes answers to a series of frequently asked questions (FAQs) about key blocks.
3 min read
How Common Criteria Helps Organizations Choose the Right HSM
Hardware Security Modules (HSMs) are used in all card payment systems (as well as various other applications that require strong security) to protect...
3 min read
Cryptomathic Signer: Advanced eIDAS-Compliant Signing
As part of the global drive for digital transformation, legally binding digital signatures are at the forefront of many businesses’ ambitions to...
5 min read
How an e-Signature Failure Derailed a €3bn Swiss-Austrian Deal
Last week order for 186 double-decker trains was nullified due to a legal formality surrounding the Qualified Electronic Signature used to ink the...
5 min read
Maximizing PCI & Cryptographic System Security
This article talks about how different factors and controls can affect the strength and effectiveness of a cryptographic system's security. It gives...
3 min read
How FinTechs can benefit from the European eIDAS Regulation
The financial service industry has always been innovator in technology adoption. This is not surprising considering the nature of the industry with...
4 min read
Where 2FA and PKI Meet: Challenges and Solutions
Under pressure from sophisticated attacks and rising fraud, many B2C organisations of the financial industry are currently enhancing the static...
3 min read
Key Utilization and Storage in ANSI X9.24-1-2017
This article briefly summarizes the symmetric cryptographic key utilization and storage requirements as described by the ANSI X9.24-1-2017 (part 1)...
2 min read
Case Study – Fully digital trade transactions
Great strides have been made in the retail banking and payments space via innovative financial technology products. However, in the corporate banking...
6 min read
epassport inspection: The Need for Speed
Ever since the EU mandated the introduction of biometric ePassports containing fingerprints there has been a flurry of technology development and...
4 min read
Issuing MULTOS Cards: Emerging Security Technology
MULTOS cards are being deployed in steadily increasing numbers and Cryptomathic is delighted to be involved in MULTOS projects across the globe....
3 min read
The Need for a Banking-Grade KMS for IBM z/OS
The IBM mainframe series (“z-series”) has become a backbone for security, privacy and resilience in a large share of payment and banking related...
3 min read
Thales Key Blocks and payShield HSMs: How They Work
Thales Key Blocks are an essential cryptographic key wrapping format. In comparison to other key block formats, they are proprietary and only work...
3 min read
Bridging eIDAS & Anti-Money Laundering Directives
Banks and other financial institutions are playing a key role in countering global challenges like money laundering and terror financing.
2 min read
Cryptomathic CKMS: Automated Key Management for payShield
Banks and financial institutions must adhere to a rigorous set of security and regulatory practices to protect data, communications, and processes.
3 min read
Selecting the Right Key Management System
The protection and secure management of cryptographic keys is crucial for ensuring that cryptography is used in the most effective way to keep data...
3 min read
Attacks on PDF Certification and the impact on Approval Signatures
In May 2021, researchers published two attacks on certified PDFs, which enabled unintentional and fraudulent modifications to be applied to signed...
4 min read
Understanding BYOK for Azure Key Vault
This article explores how Cryptomathic CKMS combines BYOK for the MS Azure Key Vault with banking-grade key lifecycle management; to address the...
4 min read
Challenges of Key Management for Cloud IaaS Providers
This article discusses key management methods for the IaaS Cloud model, and security problems to be dealt with because of its virtualization...
3 min read
eIDAS Enabled Solutions: Market and Stakeholders Analysis
The ultimate aim of regulations like eIDAS is the creation of a true Digital Single Market (DSM). eIDAS plays its role by providing the necessary...
3 min read
UUM&DS Project – How eIDAS Enhances EU’s Customs Interface
With each passing year, the volume of international trade in goods and services keeps rising. With all of this trade, however, comes an associated...
4 min read
Air India's Data Breach - data security is more crucial than ever.
Recent global events have demonstrated that high-profile hackers and state-sponsored security breaches have been steadily increasing since 2020. It...