Which Industry Sectors MUST Use Electronic Signatures?

Which Industry Sectors MUST Use Electronic Signatures?

Certain industries have a necessity to protect confidential information as well as a requirement for authentication - proving that a document was sent by a particular person. In this blog post, we will not be looking at why specific industry sectors SHOULD use electronic signatures, instead, we aim to educate the reader on where and why certain sectors NEED to use them.

Read more
How to Convert Key Blocks

How to Convert Key Blocks

There are several types of key block formats used in different industries, especially the retail banking industry. The systems that use these key blocks are part of heterogeneous networks. Therefore, they need to interchange their data with other systems, potentially using different key block formats or even different key binding algorithms (key wraps, key encapsulation, etc.). In what follows, we will explain how this is possible and what techniques are used to perform that.

Read more
Good key management for financial services: protecting your digital assets from the inside out

Good key management for financial services: protecting your digital assets from the inside out

Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside vendors for effective cybersecurity. The financial services industry must evolve its encryption and key management strategies in line with its changing infrastructure models, advocating an inside-out approach that has proven itself over time.

Read more
The NIST Announcement on Quantum-Resistant Cryptography Standards is Out. Act Now!

The NIST Announcement on Quantum-Resistant Cryptography Standards is Out. Act Now!

An over five-year-long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of the NIST Post-Quantum Crypto (PQC) Standardization Process, that is, which quantum-resistant cryptographic algorithms NIST has selected for standardization.

Read more
EMV Payment Security - Cardholders

EMV Payment Security - Cardholders

Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment security in relation to cardholders.

Read more
Qualified Digital Signing: The Electronic Execution of Documents in England & Wales

Qualified Digital Signing: The Electronic Execution of Documents in England & Wales

Looking at the current situation in England and Wales, this article aims to demystify electronic signatures and explain how they can be used in all types of electronic transactions in accordance with UK eIDAS legislation.

Read more
Crypto-Agility: The gold at the end of the Rainbow for NIST PQC Standardization

Crypto-Agility: The gold at the end of the Rainbow for NIST PQC Standardization

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for post-quantum cryptography standards and the importance of future-proofing how we use cryptography to protect data in the advent of quantum computing and beyond.

Read more
eIDAS Qualified Remote Signing Technology – Different Integration Options

eIDAS Qualified Remote Signing Technology – Different Integration Options

The demand for remote digital signatures to enhance security and customer experience continues to grow across the EU as the banking and financial sector moves forward with digitalization, global expansion and technological transformation. This article presents 3 integration options for Cryptomathic’s digital signing solution.

Read more
An Overview of the Different Key Block Formats

An Overview of the Different Key Block Formats

A key block is a unique cryptographic structure designed to protect cryptographic keys during transport over potentially insecure networks. A team around Mohammed M Atalla invented the concept of the key block with his Atalla key block. This solved several issues created by “key variants” that were then used for transporting keys.

Read more