Skip to the main content.

CRYPTOMATHIC BLOG

 

eba

3 min read

Strong Customer Authentication Under PSD2: EBA Insights

A fundamental objective of the Revised Payment Services Directive (PSD2) has been to reduce the risk of fraud to the maximum extent possible and...

Read More

3 min read

Postbank Master Key Breach: Strong Key Management Importance

In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...

Read More

4 min read

Understanding Tokenization in Banking and Finance

Tokenization is a generalized concept of a cryptographic hash. It means representing something by a symbol (‘token’).

Read More

3 min read

The Reasons Why a Banking KMS Must Support Atalla Key Blocks

Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...

Read More
A person peeping through a set of white Venetian blinds

3 min read

Why Native Code Obfuscation is Essential for Mobile Apps

In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...

Read More

5 min read

W3C's suggestion for a Web Cryptography API

The World Wide Web Consortium or W3C as it is commonly known was founded in 1994 by the original architect of the World Wide Web, Tim Berners-Lee. It...

Read More

8 min read

How to Secure the Lifecycle of Cryptographic Keys

This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...

Read More

6 min read

Symmetric Cryptography & Key Management: Exhaustion & Rotation

With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of...

Read More
A light brown praying mantis poised on the end of a leaf

3 min read

Mobile Banking Security: 10 Anti-Debugging Methods & Techniques

In the mobile environment, while debuggers are legal and legitimate development tools, hackers can also use them to reverse mobile banking and...

Read More