2 min read
A Summary of Revised NIST Key Management Standards
Cryptography is the foundation of protecting electronic data and cyber security. Encryption can effectively prevent breaches while also protecting...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
2 min read
Cryptography is the foundation of protecting electronic data and cyber security. Encryption can effectively prevent breaches while also protecting...
3 min read
In 2016, the National Institute of Standards and Technology (NIST) (run by the US Department of Commerce) announced they were producing a new...
7 min read
Indiana University defines authentication as "the process of determining whether someone or something is who or what it is declared to be."...
3 min read
Over the past 8-10 years, we’ve witnessed a huge rise in the use and application of mobile banking. At first we could check our account balances and...
3 min read
On July 1st 2016, eIDAS was introduced in the EU to replace the almost 20 year old European Signatures Directive. The directive was originally built...
3 min read
This article sheds light on the two approaches to achieve non-repudiation of an electronic message: non-repudiation of emission and non-repudiation...
3 min read
Election season in the US is upon us - and with it, comes the typical questions of how to secure ballots and prevent voter fraud. In the US, UK, and...
4 min read
Everywhere you turn in the security world, an interesting word keeps popping up: “Blockchain”. Just like the word “cloud”, this concept has taken...
3 min read
AdES stands for Advanced Electronic Signature, which embraces a family of eIDAS-compliant standards for digital signatures including PAdES, CAdES and...