Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

6 min read

A NIST-Based Summary of Cryptographic Algorithms

A system's cryptographic protection against attacks and malicious penetration is determined by two factors: (1) the strength of the keys and the...

Read More

3 min read

PCI PTS HSM: The Origin, Evaluation Criteria, and Updates

PCI PTS HSM compliance is mandated on banks, acquirers, processors and all other players involved in payment card systems. This article explores the...

Read More
Differences between Hash functions, Symmetric & Asymmetric Algorithms

4 min read

Hash Functions & Algorithms: What Are The Differences

Cryptographic algorithms can be categorized into three classes: hash functions, symmetric, and asymmetric algorithms. This article sheds light on...

Read More

5 min read

IST Key Management: Crypto-Periods & Key Type Guide

This article introduces and classifies cryptographic key types and crypto-periods as suggested by NIST, based on proven best practices for key...

Read More
EBA’s opinion on elements of Strong Customer Authentication under PSD2 – Part 2 – Possession and Knowledge

3 min read

EBA on PSD2 Customer Authentication: Possession & Knowledge

Financial institutions and solution providers are busy implementing the requirements of Strong Customer Authentication (SCA) under the Revised...

Read More

6 min read

Compliant eID Verification & Onboarding for Financial Institutions

This article discusses the benefits eIDs provide for both banks and customers in streamlining cross-border transactions and what is required under...

Read More
key-meta-data

2 min read

Why Key Metadata Is Critical and How to Manage It

This article explains the concept of meta-data in the context of cryptographic keys, explaining why it is used and the necessity to manage it well.

Read More
What is Banking-Grade Tokenization According to PCI DSS

4 min read

Banking-Grade Tokenization: PCI DSS Standards Explained

The concept of a token has been used in the digital world for almost 50 years to separate and protect real data elements from exposure. In recent...

Read More
Toy robot writing its signature on a paper notepad, representing the concept of digital signatures and PKCS 7

4 min read

A Beginner’s Guide to PKCS #7 and Digital Signatures

In many parts of the world, including the European Union and the United States, businesses have adopted digital signing as a way to implement...

Read More