Skip to the main content.

CRYPTOGLOSSARY

 

TALK TO AN EXPERT

 

CLARIFYING CRYPTOGRAPHY ONE TERM AT A TIME

 

Cryptomathic’s CryptoGlossary is a resource for learning about cryptographic-related topics for governments, banks, and businesses that want to gain a deeper understanding. 

KEY MANAGEMENT GLOSSARY

Essential definitions of key management and cryptography terms for security, compliance, and digital trust.

WHAT IS A KEY MANAGEMENT?

The practice of securely generating, distributing, storing, rotating, and retiring cryptographic keys. It ensures confidentiality, integrity, and compliance across systems.

 
polygon-13-1

WHAT IS SYMMETRIC ENCRYPTION?

An encryption method where the same secret key is used for both encrypting and decrypting data. It’s fast and efficient, but requires secure key sharing.

polygon-13-1

WHAT IS PKI (PUBLIC KEY INFRASTRUCTURE)?

A framework of policies, technologies, and certificates that uses public/private key pairs to enable authentication, encryption, and digital trust. 



polygon-13-1

WHAT IS A CRYPTOGRAPHIC KEY MANAGEMENT SYSTEM (CKMS)?

A centralized solution that automates key lifecycle tasks, enforces security policies, integrates with applications, and helps organizations stay compliant.

polygon-13-1

WHAT IS CRYPTOMATHIC'S CKMS?

A scalable enterprise platform that connects with HSMs, automates manual key operations, manages multiple formats and apps, and provides audit-ready logging

polygon-13-1

WHAT IS THE CRYPTO SERVICE GATEWAY (CSG)?

A management layer that standardizes access to heterogeneous HSMs, giving organizations one unified interface for cryptographic operations. 

polygon-13-1

WHAT IS CRYSTALKEY 360?

Cryptomathic’s advanced key management product delivers compliance, crypto-agility, role-based access, and significant cost savings for enterprises.

polygon-13-1

CENTRALIZED VS DISTRIBUTED KEY MANAGEMENT

Centralized management unifies key control, visibility, and auditing, while distributed management increases complexity and risk of errors.

polygon-13-1
DISCOVER MORE ABOUT KEY MANAGEMENT
Barclays front cover banking-2

Tier 1 Bank's Quantum-Ready Transformation

To prepare for quantum-safe operations and enhance agility, a tier 1 bank implemented Crypto Service Gateway (CSG).

Read the case study

 

PCI DSS-1

PCI DSS And Crypto Key Management

Dive into this high-level summary of how a Key Management System applies to PCI DSS and the benefits of a centralized key management system.

Download the whitepaper

 

KM BUYERS GUIDE THUMBNAILS

Selecting The Right Key Management System

Explore the buyers guide with a supplier and system check list to selecting the right key management system for your organization.

Download the whitepaper

 

MOBILE APPLICATION GLOSSARY

Key definitions and techniques for protecting mobile apps against rooting, tampering, phishing, and other threats.

WHAT IS MASC (MOBILE APP SECURITY CORE)?

 

HERO (1)

WHAT IS APP-LEVEL ENCRYPTION?

HERO (1)

WHAT IS OBFUSCATION?

HERO (1)

WHAT IS CODE HARDENING?

 
HERO (1)-1

WHAT IS RUNTIME APPLICATION SELF-PROTECTION (RASP)?

HERO (1)

WHAT IS API PROTECTION?

HERO (1)

WHAT IS ANTI-REVERSE ENGINEERING/ ANTI-TAMPERING?

 
HERO (1)
DISCOVER MORE ABOUT MOBILE APP SECURITY
TIER 1 BANK front cover banking

Tier 1 European Bank – Mobile Banking App

To meet customer demand, a large European bank launched a feature-rich mobile banking app for their retail customers. 

Read the case study

 

Securing mobile apps with masc thumbnail

Securing Mobile Apps With MASC 

Explore how MASC provides the strongest mobile app protections for banks, financial institutions and governments.

Downlaod the whitepaper

 

BOSA front cover thumbnail

BOSA'S Mobile Identity Wallet Journey

To meet rising citizen demands for digital access BOSA implemented a secure, and scalable mobile identity solution.

Read the case study

 

QUANTUM COMPUTING GLOSSARY

Clear definitions of quantum computing and post-quantum cryptography to help organizations prepare for the quantum threat

WHAT IS QUANTUM COMPUTING?

Quantum computing uses quantum bits (qubits) that can exist in multiple states simultaneously, allowing certain calculations to be performed exponentially faster than with classical computers.

polygon-5

HOW DOES QUANTUM COMPUTING DIFFER FROM CLASSICAL COMPUTING?

Classical computers use binary bits (0 or 1), while quantum computers use qubits, which can represent 0 and 1 at the same time through superposition. Quantum entanglement and interface enable new problem-solving capabilities.

polygon-5

WHAT IS QUANTUM CRYPTOGRAPHY?

Quantum cryptography leverages quantum mechanics to secure communications, such as Quantum Key Distribution (QKD), which detects any eavesdropping attempts. 

polygon-5

HOW COULD QUANTUM COMPUTERS BREAK RSA ENCRYPTION?

A sufficiently powerful quantum computer could use Shor’s algorithm to factor large prime numbers quickly, breaking RSA and other public-key cryptosystems. 

polygon-5

HOW SOON COULD QUANTUM COMPUTING BREAK TODAY'S ENCRYPTION STANDARDS?

Estimates vary, but experts suggest large-scale quantum computers capable of breaking RSA and ECC may appear within the next 10-20 years, making preparation essential now. 

polygon-5

WHAT IS POST-QUANTUM CRYPTOGRAPHY (PQC)?

PQC refers to new cryptographic algorithms designed to resist attacks from quantum computers while still being secure against classical attacks

polygon-5

WHAT IS CRYPTO-AGILITY?

The ability of a system to quickly switch algorithms, key lengths, or cryptographic protocols without major redesign. It future-proofs security against new threats and regulations. 

polygon-5

HOW CAN ORGANIZATIONS TRANSITION TO QUANTUM-SAFE ENCRYPTION?

Organizations should adopt crypto-agility by designing systems that can switch algorithms easily, testing PQC standards, updating key management processes, and planning phased migrations to quantum-safe cryptography. 

polygon-5
WP1 THUMBNAIL

The Compliance Mandate For PQC Migration

Part 1 of 3 whitepapers exploring the regulatory drivers shaping PQC migration for financial institutions.

Download the whitepaper

 

WP2 THUMBNAIL

Roadblocks To PQC Migration & Strategic Solutions For Financial Institutions

Part 2 of 3 whitepapers exploring the roadblocks to PQC migration and how financial institutions can overcome them.

Download the whitepaper

 

WP3 THUMBNAIL

Roadmap To PQC Migration For Financial Institutions

Part 3 of 3 whitepapers outlining the roadmap financial institutions can follow for PQC Migration

Download the whitepaper

 

DIGITAL IDENTITIES & SIGNATURES GLOSSARY

Explore the key concepts behind digital identities, certificates, and signatures that enable secure online trust.

WHAT IS A DIGITAL IDENTITY?

A digital identity is the set of electronic attributes and data that represent a person, device, or organization online. It’s used for authentication, access, and verification. 

polygon-16

WHAT IS AN IDENTITY PROVIDER (IDP)?

An IdP is a trusted service that authenticates users and issues identity assertions (like tokens or certificates) so apps and services can verify them.

polygon-16

WHAT ROLES DO CREDENTIALS PLAY IN DIGITAL IDENTITY?

Credentials (like passwords, certificates, or tokens) prove a person or entity’s claimed identity and are required to access digital services securely.  

polygon-16

WHAT IS A DIGITAL WALLET?

A digital wallet stores electronic credentials, certificates, and signatures, allowing users to authenticate and sign securely through mobile or online apps. 



polygon-16

WHAT IS SIGNER?

Signer is Cryptomathic’s solution for creating secure digital signatures, binding an identity to content while meeting compliance requirements such as eIDAS.

polygon-16

WHAT IS A TRUST SERVICE PROVIDER (TSP)?

A TSP issues and manages digital certificates for signatures, authentication, and encryption in compliance with legal and regulatory standards. 

polygon-16

WHAT IS A QUALIFIED TRUST SERVICE PROVIDER?

A QTSP is a TSP certified under eIDAS to issue qualified certificates, providing the highest legal assurance across the EU.

polygon-16

WHAT IS A QUALIFIED SIGNATURE CREATION DEVICE (QSCD)?

A QSCD is a secure device (hardware or software) that ensures only the rightful signatory can use their private key to generate a qualified electronic signature.  

polygon-16

WHAT IS EIDAS?

polygon-16

WHAT IS A QUALIFIED ELECTRONIC SIGNATURES (QES)?

polygon-16

WHAT IS WYSIWYS?

polygon-16

WHAT IS A QUALIFIED SEAL?

polygon-16
DISCOVER MORE ABOUT DIGITAL IDENTITIES & SIGNATURES
EIDAS QES FRONT COVER THUMBNAIL

eIDAS Compliant Qualified Electronic Signatures (QES)

Explore how to navigate eIDAS regulations and integrate eIDAS compliant qualified electronic signatures.

Read the case study

 

UBS front cover banking

UBS' Transformation Using Qualified Electronic Signatures 

UBS implemented a QES solution to enable secure digital signing of legally binding documents anytime, anywhere.

Read the case study

 

DIS BUYERS GUIDE THUMBNAILS

Selecting The Right Qualified Signing and Sealing Solution

Explore the solution and vendor checklist to selecting the right signing and sealing solution for your organization.

Download the whitepaper

 

PAYMENTS GLOSSARY

Your reference for EMV technology, explaining standards, secure card issuance and transactions.

WHAT IS EMV?

HERO

WHAT IS AN EMV TRANSACTION?

HERO

WHAT IS EMV DATA?

 
HERO

WHAT IS TOKENIZATION IN PAYMENTS?

 

HERO

HOW DOES CARDINK FIT INTO EMV CARD ISSUANCE PROCESS?

HERO

HOW ARE CRYPTOGRAPHIC KEYS USED IN EMV DATA PREPARATION?

HERO

WHAT IS OBSIDIAN?

 
HERO

WHAT ARE THE BENEFITS OF EMV-COMPLIANT DATA PREPARATION?

HERO
DISCOVER MORE ABOUT PAYMENTS
ELAN front cover

Elan Financial Services And EMV Success Powered by Cryptomathic

Elan migrated its systems to be able to process EMV contact and contactless transactions and enable clients to issue Visa and Mastercard EMV cards. 

Read the case study

 

ESSENTIALS OF EMV CA FRONT COVER SOCIAL

The Essentials Of EMV Certificate Authority For A New Payment Scheme

Explore the reasons behind the rising interest in new domestic payment schemes, technical requirements to establish schemes & the value proposition of an EMV CA

Download the whitepaper

 

 

CREDIT AGRICOLE front cover

Crédit Agricole Achieves High Level Security With CardInk

Crédit Agricole hassuccessfully achieved to manage the high level of security required for issuing EMV® cards with Cryptomathic

Read the case study

 

CRYPTOGRAPHIC KEYS GLOSSARY

Clear definitions of cryptographic key terms, helping you understand how keys underpin modern security and digital trust.

WHAT IS A CRYPTOGRAPHIC KEY?

A cryptographic key is a string of bits used in algorithms to encrypt, sign, or verify data. It determines the output of a cryptographic process.

polygon-15

WHAT IS THE DIFFERENCE BETWEEN A PUBLIC KEY AND A PRIVATE KEY?

A public key is openly shared and used to encrypt data or verify signatures. A private key is kept secret and used to decrypt data or create signatures.

polygon-15

HOW DOES A CRYPTOGRAPHIC KEY WORK?

A key feeds into a cryptographic algorithm to transform data - either scrambling it (encryption), restoring it (decryption), or proving authenticity (signatures).

polygon-15

WHAT IS KEY LENGTH AND WHY DOES IT MATTER?

Key length is the size (in bits) of the key. Longer keys are harder to brute force, making them more secure but also potentially slower in performance. 

polygon-15

WHAT IS A KEY PAIR IN CRYPTOGRAPHY?

A key pair is the combination of a public key and a private key used in asymmetric encryption and digital signatures. The two keys are mathematically linked. 

polygon-15

HOW ARE CRYPTOGRAPHIC USED IN ENCRYPTION?

Keys are essential for both symmetric and asymmetric encryption - determining how plaintext is transformed into ciphertext and back again. 

polygon-15

WHAT IS THE ROLE OF CRYPTOGRAPHIC KEYS IN DIGITAL SIGNATURES & HOW DO THEY PROTECT DATA?

Private keys create digital signatures, while public keys verify them - ensuring authenticity, integrity, and non-repudiation of data. At rest, keys encrypt stored files, databases, or devices so only authorized parties can read them.

polygon-15

HOW TO CRYPTOGRAPHIC KEYS ENABLE SECURE AUTHENTICATION?

Keys prove identity by signing challenges, establishing secure sessions, or encrypting authentication exchanges between a user and a system.

polygon-15
EXPLORE OUR FAQS