Skip to the main content.

CRYPTOMATHIC FREQUENTLY ASKED QUESTIONS

 

TALK TO AN EXPERT

 

CRYPTOGRAPHY SOLUTIONS FAQS

 

The Cryptomathic enterprise-grade cryptographic platform enables secure, compliant and seamless protection of sensitive data cross on-prem, hybrid and multicloud environments, unlocking innovation without compromising control. 

MOBILE APP SECURITY CORE (MASC)

 

Discover how our  Mobile App Security Core (MASC) secures in‑app data and interactions with enterprise‑grade protections—encompassing runtime defense, secure storage, hardened code, API and network controls, and seamless integration with existing systems.

HERO (1)-1

KEY MANAGEMENT - POWERED BY CRYSTALKEY360

 

CrystalKey 360 from Cryptomathic streamlines and centralizes key management across diverse environments—whether on-premise, private cloud, public cloud, or hybrid setups. It offers a unified platform for automated key lifecycle control, strong policy enforcement, cryptographic agility (including readiness for post-quantum standards), multi-cloud vendor independence, and simplified auditing.

polygon-13-1

OBSIDIAN

 

Obsidian is Cryptomathic’s modern, modular, and future-proof payment platform designed for issuers, payment schemes, fintechs, and processors. Whether deployed on-premise or in the cloud, Obsidian centralizes and streamlines all core issuer functions—including card issuance, PIN management and transaction authorization

HERO

DIGITAL IDENTITIES & SIGNATURES

 

Cryptomathic’s suite of Digital Signature & Identification Solutions empowers organizations to deliver secure, legally binding, and seamless digital experiences. The Signer solution enables legally enforceable digital signing using Qualified Electronic Signatures (QES).

HERO (9)

Mobile App Security Core (MASC) Frequently Asked Questions (FAQs)

 

What is Mobile App Security Core (MASC)?
MASC is Cryptomathic’s SDK-based solution that embeds security directly into mobile apps. It combines runtime threat detection, code hardening, secure storage, and network/API protection to defend apps against tampering, fraud, and data theft.

How can banks protect mobile banking apps against threats?
Banks can protect mobile apps using Cryptomathic’s Mobile App Security Core (MASC), which enforces in-app cryptographic controls, runtime protection, and code hardening. MASC aligns with OWASP MASVS and ENISA guidelines, helping banks secure sensitive operations even in zero-trust environments.

How does MASC protect apps at runtime?
MASC uses sentinel-based Runtime Application Self-Protection (RASP) to monitor the app environment in real time. It detects anomalies like rooting, debugging, or malware, and responds immediately—blocking, alerting, or adapting app behavior.

What types of apps use MASC?
MASC is built for high-risk, high-compliance apps, such as mobile banking, e-payment wallets, eID/EUDI wallets, and any application that processes sensitive data or transactions.

How does MASC support compliance?
Out of the box, MASC aligns with 94% of OWASP Mobile App Security Verification Standard (MASVS) requirements and ENISA smartphone security guidelines—helping organizations meet regulatory and audit obligations.

TIER 1 BANK front cover banking

Tier 1 European Bank – Mobile Banking App

To meet customer demand, a large European bank launched a feature-rich mobile banking app for their retail customers. 

Read the case study

 

Securing mobile apps with masc thumbnail

Securing Mobile Apps With MASC 

Explore how MASC provides the strongest mobile app protections for banks, financial institutions and governments.

Downlaod the whitepaper

 

BOSA front cover thumbnail

BOSA'S Mobile Identity Wallet Journey

To meet rising citizen demands for digital access BOSA implemented a secure, and scalable mobile identity solution.

Read the case study

 

Key Management Frequently Asked Questions (FAQs)

What is enterprise-grade key management?
It’s a centralized, automated system—typically a platform like CrystalKey 360—that handles the entire lifecycle of cryptographic keys, automates routine operations, enforces policy consistently, and delivers robust auditing for compliance and security at scale.

How does CrystalKey 360 manage key lifecycle—from generation to retirement?
CrystalKey 360 automates key generation, import, export, rotation, renewal, backup, revocation, versioning, and destruction. It enforces usage policies, distributes keys securely (even across HSMs), and maintains tamper-evident logs—ensuring reliability, efficiency, and reduced human error.

How does CrystalKey 360 help with compliance and auditing?
It automatically logs every key operation in tamper-proof audit trails, enables easy demonstration of compliance with standards like PCI-DSS and GDPR, and simplifies passing both internal and external audits.

What does cryptographic agility and future-proofing mean?
CrystalKey 360 is designed to evolve—allowing you to seamlessly transition to new algorithms or post-quantum cryptography, adapt to emerging regulatory requirements, and avoid vendor lock-in across multi-cloud or multi-HSM deployments.

What is Post-Quantum Cryptography (PQC)?
PQC refers to cryptographic algorithms designed to remain secure against attacks from quantum computers. While traditional algorithms could be broken by large-scale quantum machines, PQC algorithms are built to withstand this new threat landscape. CrystalKey 360 is engineered with PQC readiness, ensuring organizations can migrate smoothly when standards mature.

How does PQC affect compliance requirements?
Regulatory bodies and standards organizations are already preparing for the quantum era. NIST has published draft PQC standards, and frameworks like PCI DSS, eIDAS 2, and GDPR will evolve to mandate quantum-safe protections. By adopting a platform like CrystalKey 360—with built-in PQC readiness and cryptographic agility—enterprises can stay ahead of compliance deadlines and avoid disruptive migrations later.

Barclays front cover banking

Barclays' Quantum-Ready Transformation

To prepare for quantum-safe operations and enhance agility, Barclays implemented Crypto Service Gateway (CSG).

Read the case study

 

WP1 THUMBNAIL

The Compliance Mandate For PQC Migration

Part 1 of 3 whitepapers exploring regulation, roadblocks and roadmap for PQC migration for financial institutions.

Download the whitepaper

 

KM BUYERS GUIDE THUMBNAILS

Selecting The Right Key Management System

Explore the buyers guide with a supplier and system check list to selecting the right key management system for your organization.

Download the whitepaper

 

Obsidian Frequently Asked Questions (FAQs)

 

What is Obsidian?
Obsidian is a modular payment issuer platform that integrates key card services—issuance, PIN management, transaction authorization, certificate authority, and key management—into a scalable, modern solution for virtual and physical card programs. It can be deployed in both on-premise and cloud environments.

Which modules does Obsidian include?
Key modules include:

Card Issuance – Manage the lifecycle of virtual and physical EMV® cards, including batch and instant issuance.
PIN Management – Secure, multi-channel PIN generation, selection, reminder, and reset.
EMV Authorization – Handle script execution, risk parameters, and real-time payment decisions.
Certificate Authority (CA) – Manage root and issuer certificates for EMV compliance.
Payment Key Management – Lifecycle control of keys used throughout the card issuance and personalization process.

How does Obsidian accelerate go-to-market and modernize issuing operations?
It centralizes issuer workflows into a single platform, enabling quick issuance of new cards (digital or physical) and seamless integration of modern payment methods and wallet deployment—reducing complexity and cost while enabling innovation.

What compliance and security features does Obsidian offer?
Obsidian embeds PCI compliance. It supports the full cryptographic and operational requirements of issuer environments to safeguard card data and maintain regulatory alignment.

ELAN front cover

Elan Financial Services And EMV Success Powered by Cryptomathic

Elan migrated its systems to be able to process EMV contact and contactless transactions and enable clients to issue Visa and Mastercard EMV cards. 

Read the case study

 

ESSENTIALS OF EMV CA FRONT COVER SOCIAL

The Essentials Of EMV Certificate Authority For A New Payment Scheme

Explore the reasons behind the rising interest in new domestic payment schemes, technical requirements to establish schemes & the value proposition of an EMV CA

Download the whitepaper

 

 

CREDIT AGRICOLE front cover

Crédit Agricole Achieves High Level Security With CardInk

Crédit Agricole hassuccessfully achieved to manage the high level of security required for issuing EMV® cards with Cryptomathic

Read the case study

 

Digital Identities & Signatures Frequently Asked Questions (FAQs)

 

What is a Trust Service Provider (TSP)?
Under the eIDAS regulation, a Trust Service Provider (TSP) is an entity authorized to offer electronic trust services—like issuing qualified digital certificates, electronic signatures, seals, timestamps, and preservation services. TSPs must meet stringent requirements to operate legally across member states.

What is eIDAS?
eIDAS is an EU regulation governing digital identities and trust services. It defines legal frameworks for electronic signatures, seals, timestamps, and trust services, establishing standards for advanced and qualified electronic signatures that ensure cross-border interoperability and legal validity across the EU.

What is Signer?
Signer is Cryptomathic’s digital signing solution that enables organizations to deliver Qualified Electronic Signatures (QES) at scale. It provides WYSIWYS (What You See Is What You Sign) assurance, integrates with QSCDs (Qualified Signature Creation Devices), and ensures signatures are legally binding under eIDAS. Signer is widely used by banks, governments, and TSPs to provide citizens and customers with secure, frictionless digital signing experiences.

What is a QSCD?
A Qualified Signature Creation Device (QSCD) is a secure hardware or software component certified under eIDAS to generate and protect signing keys used for Qualified Electronic Signatures. A QSCD ensures that only the legitimate signatory can access their private signing key and that the key cannot be copied, tampered with, or misused. By law, signatures generated with a QSCD qualify as having the same legal value as a handwritten signature across the EU.

What makes Signer a Qualified Electronic Signature (QES) solution?
Signer delivers QES-level assurance by leveraging a Qualified Signature Creation Device (QSCD)—a secure, certified hardware or software module that ensures only the signatory has control over the signing key. QES carries the same legal weight as handwritten signatures across the EU under eIDAS.

What is "What You See Is What You Sign" (WYSIWYS) and why does it matter?
WYSIWYS ensures users digitally sign exactly what they see on-screen—preventing hidden data or content changes between viewing and signing. Signer uses WYSIWYS to enhance legal certainty and prevent disputes around what was actually signed.

EIDAS QES FRONT COVER THUMBNAIL

eIDAS Compliant Qualified Electronic Signatures (QES)

Explore how to navigate eIDAS regulations and integrate eIDAS compliant qualified electronic signatures.

Read the case study

 

UBS front cover banking

UBS' Transformation Using Qualified Electronic Signatures 

UBS implemented a QES solution to enable secure digital signing of legally binding documents anytime, anywhere.

Read the case study

 

DIS BUYERS GUIDE THUMBNAILS

Selecting The Right Qualified Signing and Sealing Solution

Explore the solution and vendor checklist to selecting the right signing and sealing solution for your organization.

Download the whitepaper