Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

Open Banking - Success through Agile Alignment of Security Infrastructure, Strategy and Technology

5 min read

Agile Alignment: The Key to Open Banking Success

Open banking can offer opportunities for retail banks that are faced with competition from newcomers to the banking and finance industry. For those...

Read More

6 min read

Advanced or Qualified eIDAS Signatures: What to Choose?

The Electronic Identification and Trust Services Regulation (EU Regulation 910/2014/EC - also known as eIDAS) is a complex set of laws (including...

Read More
eba

3 min read

Strong Customer Authentication Under PSD2: EBA Insights

A fundamental objective of the Revised Payment Services Directive (PSD2) has been to reduce the risk of fraud to the maximum extent possible and...

Read More

5 min read

W3C's suggestion for a Web Cryptography API

The World Wide Web Consortium or W3C as it is commonly known was founded in 1994 by the original architect of the World Wide Web, Tim Berners-Lee. It...

Read More

6 min read

Symmetric Cryptography & Key Management: Exhaustion & Rotation

With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of...

Read More

2 min read

The need to manage both symmetric and asymmetric keys

A well-rounded solution for securing digital transactions includes the use of both symmetric and asymmetric cryptography and keys. Each method of...

Read More

5 min read

Symmetric Encryption Algorithms And The Need For Crypto-Agility

In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...

Read More

3 min read

Understanding Encryption Modes with Symmetric Ciphers

In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...

Read More

4 min read

An Overview of Symmetric Encryption and the Key Lifecycle

In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...

Read More