CLARIFYING CRYPTOGRAPHY ONE TERM AT A TIME
Cryptomathic’s CryptoGlossary is a resource for learning about cryptographic-related topics for governments, banks, and businesses that want to gain a deeper understanding.
KEY MANAGEMENT GLOSSARY
Essential definitions of key management and cryptography terms for security, compliance, and digital trust.
WHAT IS A KEY MANAGEMENT?
The practice of securely generating, distributing, storing, rotating, and retiring cryptographic keys. It ensures confidentiality, integrity, and compliance across systems.
WHAT IS SYMMETRIC ENCRYPTION?
An encryption method where the same secret key is used for both encrypting and decrypting data. It’s fast and efficient, but requires secure key sharing.
WHAT IS PKI (PUBLIC KEY INFRASTRUCTURE)?
A framework of policies, technologies, and certificates that uses public/private key pairs to enable authentication, encryption, and digital trust.
WHAT IS A CRYPTOGRAPHIC KEY MANAGEMENT SYSTEM (CKMS)?
A centralized solution that automates key lifecycle tasks, enforces security policies, integrates with applications, and helps organizations stay compliant.
WHAT IS CRYPTOMATHIC'S CKMS?
A scalable enterprise platform that connects with HSMs, automates manual key operations, manages multiple formats and apps, and provides audit-ready logging
WHAT IS THE CRYPTO SERVICE GATEWAY (CSG)?
A management layer that standardizes access to heterogeneous HSMs, giving organizations one unified interface for cryptographic operations.
WHAT IS CRYSTALKEY 360?
Cryptomathic’s advanced key management product delivers compliance, crypto-agility, role-based access, and significant cost savings for enterprises.
CENTRALIZED VS DISTRIBUTED KEY MANAGEMENT
Centralized management unifies key control, visibility, and auditing, while distributed management increases complexity and risk of errors.
Tier 1 Bank's Quantum-Ready Transformation
To prepare for quantum-safe operations and enhance agility, a tier 1 bank implemented Crypto Service Gateway (CSG).
PCI DSS And Crypto Key Management
Dive into this high-level summary of how a Key Management System applies to PCI DSS and the benefits of a centralized key management system.
Selecting The Right Key Management System
Explore the buyers guide with a supplier and system check list to selecting the right key management system for your organization.
MOBILE APPLICATION GLOSSARY
Key definitions and techniques for protecting mobile apps against rooting, tampering, phishing, and other threats.
WHAT IS MASC (MOBILE APP SECURITY CORE)?
An iOS and Android SDK that embeds layered, in-app security to protect against tampering, rooting, jailbreaking, and other attacks—all without relying solely on the device’s operating system.
WHAT IS APP-LEVEL ENCRYPTION?
Encryption applied directly within the app to secure sensitive data such as credentials, tokens, or business logic, even if the device itself is compromised.
WHAT IS OBFUSCATION?
A technique that transforms source or binary code into a harder-to-read format, protecting sensitive logic from reverse engineering.
WHAT IS CODE HARDENING?
Adding multiple layers of protection to an app (encryption, obfuscation, anti-tampering, RASP) to make attacks significantly harder and more time-consuming.
WHAT IS RUNTIME APPLICATION SELF-PROTECTION (RASP)?
A security feature embedded inside the app that monitors its behavior at runtime, detects malicious activity (e.g., tampering, hooking), and can block or shut down attacks in real time.
WHAT IS API PROTECTION?
Safeguarding mobile APIs from misuse through authentication, encryption, token management, and anomaly detection, preventing fraud or unauthorized access.
WHAT IS ANTI-REVERSE ENGINEERING/ ANTI-TAMPERING?
Safeguarding mobile APIs from misuse through authentication, encryption, token management, and anomaly detection, preventing fraud or unauthorized access.
Tier 1 European Bank – Mobile Banking App
To meet customer demand, a large European bank launched a feature-rich mobile banking app for their retail customers.
Securing Mobile Apps With MASC
Explore how MASC provides the strongest mobile app protections for banks, financial institutions and governments.
BOSA'S Mobile Identity Wallet Journey
To meet rising citizen demands for digital access BOSA implemented a secure, and scalable mobile identity solution.
QUANTUM COMPUTING GLOSSARY
Clear definitions of quantum computing and post-quantum cryptography to help organizations prepare for the quantum threat
WHAT IS QUANTUM COMPUTING?
Quantum computing uses quantum bits (qubits) that can exist in multiple states simultaneously, allowing certain calculations to be performed exponentially faster than with classical computers.
HOW DOES QUANTUM COMPUTING DIFFER FROM CLASSICAL COMPUTING?
Classical computers use binary bits (0 or 1), while quantum computers use qubits, which can represent 0 and 1 at the same time through superposition. Quantum entanglement and interface enable new problem-solving capabilities.
WHAT IS QUANTUM CRYPTOGRAPHY?
Quantum cryptography leverages quantum mechanics to secure communications, such as Quantum Key Distribution (QKD), which detects any eavesdropping attempts.
HOW COULD QUANTUM COMPUTERS BREAK RSA ENCRYPTION?
A sufficiently powerful quantum computer could use Shor’s algorithm to factor large prime numbers quickly, breaking RSA and other public-key cryptosystems.
HOW SOON COULD QUANTUM COMPUTING BREAK TODAY'S ENCRYPTION STANDARDS?
Estimates vary, but experts suggest large-scale quantum computers capable of breaking RSA and ECC may appear within the next 10-20 years, making preparation essential now.
WHAT IS POST-QUANTUM CRYPTOGRAPHY (PQC)?
PQC refers to new cryptographic algorithms designed to resist attacks from quantum computers while still being secure against classical attacks
WHAT IS CRYPTO-AGILITY?
The ability of a system to quickly switch algorithms, key lengths, or cryptographic protocols without major redesign. It future-proofs security against new threats and regulations.
HOW CAN ORGANIZATIONS TRANSITION TO QUANTUM-SAFE ENCRYPTION?
Organizations should adopt crypto-agility by designing systems that can switch algorithms easily, testing PQC standards, updating key management processes, and planning phased migrations to quantum-safe cryptography.
The Compliance Mandate For PQC Migration
Part 1 of 3 whitepapers exploring the regulatory drivers shaping PQC migration for financial institutions.
Roadblocks To PQC Migration & Strategic Solutions For Financial Institutions
Part 2 of 3 whitepapers exploring the roadblocks to PQC migration and how financial institutions can overcome them.
Roadmap To PQC Migration For Financial Institutions
Part 3 of 3 whitepapers outlining the roadmap financial institutions can follow for PQC Migration
DIGITAL IDENTITIES & SIGNATURES GLOSSARY
Explore the key concepts behind digital identities, certificates, and signatures that enable secure online trust.
WHAT IS A DIGITAL IDENTITY?
A digital identity is the set of electronic attributes and data that represent a person, device, or organization online. It’s used for authentication, access, and verification.
WHAT IS AN IDENTITY PROVIDER (IDP)?
An IdP is a trusted service that authenticates users and issues identity assertions (like tokens or certificates) so apps and services can verify them.
WHAT ROLES DO CREDENTIALS PLAY IN DIGITAL IDENTITY?
Credentials (like passwords, certificates, or tokens) prove a person or entity’s claimed identity and are required to access digital services securely.
WHAT IS A DIGITAL WALLET?
A digital wallet stores electronic credentials, certificates, and signatures, allowing users to authenticate and sign securely through mobile or online apps.
WHAT IS SIGNER?
Signer is Cryptomathic’s solution for creating secure digital signatures, binding an identity to content while meeting compliance requirements such as eIDAS.
WHAT IS A TRUST SERVICE PROVIDER (TSP)?
A TSP issues and manages digital certificates for signatures, authentication, and encryption in compliance with legal and regulatory standards.
WHAT IS A QUALIFIED TRUST SERVICE PROVIDER?
A QTSP is a TSP certified under eIDAS to issue qualified certificates, providing the highest legal assurance across the EU.
WHAT IS A QUALIFIED SIGNATURE CREATION DEVICE (QSCD)?
A QSCD is a secure device (hardware or software) that ensures only the rightful signatory can use their private key to generate a qualified electronic signature.
WHAT IS EIDAS?
eIDAS is the EU regulation that standardizes electronic identification, trust services, and digital signatures across member states, giving them legal recognition.
WHAT IS A QUALIFIED ELECTRONIC SIGNATURES (QES)?
A QES is an AdES created using a QSCD and a qualified certificate issued by a QTSP. It has the same legal value as a handwritten signature in the EU.
WHAT IS WYSIWYS?
Short for What You See Is What You Sign, this principle ensures the content displayed on-screen is exactly what is digitally signed—preventing manipulation.
WHAT IS A QUALIFIED SEAL?
A qualified electronic seal is created with a qualified certificate and QSCD, offering the highest assurance of document authenticity under eIDAS.
eIDAS Compliant Qualified Electronic Signatures (QES)
Explore how to navigate eIDAS regulations and integrate eIDAS compliant qualified electronic signatures.
UBS' Transformation Using Qualified Electronic Signatures
UBS implemented a QES solution to enable secure digital signing of legally binding documents anytime, anywhere.
Selecting The Right Qualified Signing and Sealing Solution
Explore the solution and vendor checklist to selecting the right signing and sealing solution for your organization.
PAYMENTS GLOSSARY
Your reference for EMV technology, explaining standards, secure card issuance and transactions.
WHAT IS EMV?
A global standard (Europay, Mastercard, Visa) for chip-based payment cards and secure transactions.
WHAT IS AN EMV TRANSACTION?
A chip card payment that uses dynamic cryptograms and authentication to verify the cardholder and prevent fraud.
WHAT IS EMV DATA?
The cryptographic and application information stored on an EMV chip—such as keys, certificates, and issuer parameters—that enables secure transactions.
WHAT IS TOKENIZATION IN PAYMENTS?
Replacing sensitive card numbers with unique tokens used for transactions, protecting the underlying account data.
HOW DOES CARDINK FIT INTO EMV CARD ISSUANCE PROCESS?
Cardink is Cryptomathic’s EMV data preparation solution. It generates secure card data, manages cryptographic keys, and delivers personalization files to card bureaus.
HOW ARE CRYPTOGRAPHIC KEYS USED IN EMV DATA PREPARATION?
Keys authenticate issuers, generate card certificates, create ARQCs, and secure sensitive data throughout issuance and transactions.
WHAT IS OBSIDIAN?
A modular Cryptomathic platform supporting end-to-end EMV and mobile credential issuance, from certification and PIN to personalization and transactions.
WHAT ARE THE BENEFITS OF EMV-COMPLIANT DATA PREPARATION?
It ensures global interoperability, protects against fraud, maintains compliance with card schemes, and secures the issuance process end-to-end.
Elan Financial Services And EMV Success Powered by Cryptomathic
Elan migrated its systems to be able to process EMV contact and contactless transactions and enable clients to issue Visa and Mastercard EMV cards.
The Essentials Of EMV Certificate Authority For A New Payment Scheme
Explore the reasons behind the rising interest in new domestic payment schemes, technical requirements to establish schemes & the value proposition of an EMV CA
Crédit Agricole Achieves High Level Security With CardInk
Crédit Agricole hassuccessfully achieved to manage the high level of security required for issuing EMV® cards with Cryptomathic
CRYPTOGRAPHIC KEYS GLOSSARY
Clear definitions of cryptographic key terms, helping you understand how keys underpin modern security and digital trust.
WHAT IS A CRYPTOGRAPHIC KEY?
A cryptographic key is a string of bits used in algorithms to encrypt, sign, or verify data. It determines the output of a cryptographic process.
WHAT IS THE DIFFERENCE BETWEEN A PUBLIC KEY AND A PRIVATE KEY?
A public key is openly shared and used to encrypt data or verify signatures. A private key is kept secret and used to decrypt data or create signatures.
HOW DOES A CRYPTOGRAPHIC KEY WORK?
A key feeds into a cryptographic algorithm to transform data - either scrambling it (encryption), restoring it (decryption), or proving authenticity (signatures).
WHAT IS KEY LENGTH AND WHY DOES IT MATTER?
Key length is the size (in bits) of the key. Longer keys are harder to brute force, making them more secure but also potentially slower in performance.
WHAT IS A KEY PAIR IN CRYPTOGRAPHY?
A key pair is the combination of a public key and a private key used in asymmetric encryption and digital signatures. The two keys are mathematically linked.
HOW ARE CRYPTOGRAPHIC USED IN ENCRYPTION?
Keys are essential for both symmetric and asymmetric encryption - determining how plaintext is transformed into ciphertext and back again.
WHAT IS THE ROLE OF CRYPTOGRAPHIC KEYS IN DIGITAL SIGNATURES & HOW DO THEY PROTECT DATA?
Private keys create digital signatures, while public keys verify them - ensuring authenticity, integrity, and non-repudiation of data. At rest, keys encrypt stored files, databases, or devices so only authorized parties can read them.
HOW TO CRYPTOGRAPHIC KEYS ENABLE SECURE AUTHENTICATION?
Keys prove identity by signing challenges, establishing secure sessions, or encrypting authentication exchanges between a user and a system.




