CRYPTOMATHIC BLOG

 

7 min read

Using PKI for EMV Cards in PCI DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard to prevent credit card scams and numerous additional...

Read More
Manual vs. Automated Key Management

4 min read

Manual vs. Automated Key Management

This article evaluates and compares manual and automated cryptographic key management. It looks at security-related issues as well as organizational...

Read More

3 min read

Digital Identity: How Social Media Is Changing How We Authenticate

Throughout the last decade, social media has played a vital part in our lives and has significantly shaped the younger generations.

Read More
Using 3D-Secure and Device Fingerprints for EMV Payments Against CNP Fraud

3 min read

Using 3D-Secure & Device Fingerprints for EMV Payments Against CNP Fraud

Credit cardholders are generally protected from liability if unauthorized transactions are made with their credit cards because of consumer...

Read More

3 min read

HTTPS Encryption & Authentication Threats in Banking

This article discusses the secure HTTPS Protocol intended for web-resources and its principles of operation as well as its strengths and weaknesses....

Read More
Digital Authentication - the basics

5 min read

What You Need to Know About Digital Authentication

When it comes to conducting transactions, the possibility of fraud is always a risk that cannot be overlooked. In person, an individual may present...

Read More

3 min read

Applying Cryptographic Security Services - a NIST summary

This article summarizes the basic cryptographic security services described in NIST Special Publication 800-57 (1, rev.4) for Key Management that can...

Read More

4 min read

EMV & PCI DSS Compliance: Cryptography and Key Management Requirements

EMV chips on payment cards contain cryptographic co-processors and dual interfaces that allow for contact and contactless payment options. When...

Read More

3 min read

Understanding: Can Digital Signatures Provide True Non-Repudiation

Non-repudiation is a legal concept that is widely used in information security. It refers to any service which provides proof of the origin of data...

Read More