EMV Payment Security - Cardholders

EMV Payment Security - Cardholders

Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment security in relation to cardholders.

Read more
Qualified Digital Signing: The Electronic Execution of Documents in England & Wales

Qualified Digital Signing: The Electronic Execution of Documents in England & Wales

Looking at the current situation in England and Wales, this article aims to demystify electronic signatures and explain how they can be used in all types of electronic transactions in accordance with UK eIDAS legislation.

Read more
Crypto-Agility: The Real Gold (Standard) at the End of the Rainbow

Crypto-Agility: The Real Gold (Standard) at the End of the Rainbow

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for post-quantum cryptography standards and the importance of future-proofing how we use cryptography to protect data in the advent of quantum computing and beyond.

Read more
eIDAS Qualified Remote Signing Technology – Different Integration Options

eIDAS Qualified Remote Signing Technology – Different Integration Options

The demand for remote digital signatures to enhance security and customer experience continues to grow across the EU as the banking and financial sector moves forward with digitalization, global expansion and technological transformation. This article presents 3 integration options for Cryptomathic’s digital signing solution.

Read more
An Overview of the Different Key Block Formats

An Overview of the Different Key Block Formats

A key block is a unique cryptographic structure designed to protect cryptographic keys during transport over potentially insecure networks. A team around Mohammed M Atalla invented the concept of the key block with his Atalla key block. This solved several issues created by “key variants” that were then used for transporting keys.

Read more
Explaining the Java ECDSA Critical Vulnerability

Explaining the Java ECDSA Critical Vulnerability

On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.

Read more
Qualified Electronic Signing for Digital Mortgage Disruption and why a Wet Signature is ‘so last year’ 

Qualified Electronic Signing for Digital Mortgage Disruption and why a Wet Signature is ‘so last year’ 

In the last few years, a number of digital mortgage lenders have entered the market. These lenders have been described as ‘disruptive’ - entering with an aim to simplify and streamline processes, and ultimately, reduce turnaround times.

Read more
Summary of the Practical Key Management Challenges Behind Symmetric Cryptography in Financial Institutions 

Summary of the Practical Key Management Challenges Behind Symmetric Cryptography in Financial Institutions 

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten advantages as opposed to asymmetric cryptography.

Read more
NIST PQC Finalists Update: It’s Over For The Rainbow

NIST PQC Finalists Update: It’s Over For The Rainbow

Last month, one of the three NIST finalists for post-quantum signature schemes has received its final nail in the coffin: Ward Beullens, a PostDoc at IBM Research, published a practical key recovery attack against the Rainbow signature scheme.

Read more