Cryptographic Operations - Best Practices To Make Your System Secure

This article outlines cryptographic operations and best practices you should follow to make your applications or systems secure.

Read more

Differences between Hash functions, Symmetric & Asymmetric Algorithms

Cryptographic algorithms can be categorized into three classes: Hash functions, Symmetric and Asymmetric algorithms. This article sheds light on their differences, purpose and main fields of application.

Read more

eIDAS - Enabling Banking Without Borders


The European Single Market has made it possible for large companies and small businesses to freely access one of the biggest unified markets in the world.

Read more

PKI for EMV cards compliant to PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard to prevent credit card scams and numerous additional security threats & vulnerabilities.

Read more

Manual vs. Automated Key Management

This article evaluates and compares manual and automated cryptographic key management. It looks at security-related issues as well as organizational and economic aspects.

Read more

Harmonizing digitally signed data between Russia and the EU - a Russian Perspective

This article discusses why cryptographically protected data exchange between the EU and Russia (and other countries) is still difficult to implement.

Read more

Digital Identity - How Social Media Is Changing How We Authenticate Our Identity

Throughout the last decade, social media has played a vital part in our lives and has significantly shaped the younger generations. Read more

Why Remote Signing Solutions Offer Superior Security than Keys Generated in the Browser

The recent article published by Ebbe Skak Larsen, KMD (hereafter "the Article") on hacking signatures from signature servers, describes a simplified setup of a remote signature (RS) solution and mounts an attack on that. The article then concludes that the only mitigation to the attack is to strengthen the script in the browser using obfuscation techniques.

Read more

Blending eIDAS and AML to fight against money laundering and terror funding

"Cutting off the funds " is one of the most effective weapons in the arsenal of authorities trying to deal with terrorists and other organized criminals. The international nature of such criminal organizations forces them to move money between various countries and requires international transfers and currency swaps.

Read more