3 min read
Implementing Digital Authentication Per NIST Guidelines (SP 800-63-3)
In 2016, the National Institute of Standards and Technology (NIST) (run by the US Department of Commerce) announced they were producing a new...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
3 min read
In 2016, the National Institute of Standards and Technology (NIST) (run by the US Department of Commerce) announced they were producing a new...
7 min read
Indiana University defines authentication as "the process of determining whether someone or something is who or what it is declared to be."...
3 min read
Over the past 8-10 years, we’ve witnessed a huge rise in the use and application of mobile banking. At first we could check our account balances and...
3 min read
On July 1st 2016, eIDAS was introduced in the EU to replace the almost 20 year old European Signatures Directive. The directive was originally built...
3 min read
This article sheds light on the two approaches to achieve non-repudiation of an electronic message: non-repudiation of emission and non-repudiation...
3 min read
Election season in the US is upon us - and with it, comes the typical questions of how to secure ballots and prevent voter fraud. In the US, UK, and...
4 min read
Everywhere you turn in the security world, an interesting word keeps popping up: “Blockchain”. Just like the word “cloud”, this concept has taken...
3 min read
AdES stands for Advanced Electronic Signature, which embraces a family of eIDAS-compliant standards for digital signatures including PAdES, CAdES and...
3 min read
Year after year, more stories surface about large scale data loss from e-government systems across the world.