2 min read
Expert’s Guidelines on how to document a Key Management System
This article discusses the importance and usage of documentation for a key management system within an organization.
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
2 min read
This article discusses the importance and usage of documentation for a key management system within an organization.
5 min read
Have you ever heard the kind of sweet and innocent voice saying, “I didn’t eat my brother’s ice cream”, while the kid’s mouth and t-shirt are covered...
4 min read
This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy...
2 min read
On June 11, 2016, Whitfield Diffie, a Technical Advisory Board member at Cryptomathic, and Martin E. Hellman, Professor Emeritus of Electrical...
2 min read
Under the eIDAS Regulation (EU) No 910/2014, a qualified certificate for electronic signature refers to “a certificate for electronic signatures,...
2 min read
Under Regulation (EU) No 910/2014 (eIDAS), a Trust Service Provider (TSP) is defined as “a natural or a legal person who provides one or more trust...
3 min read
When an electronic signature is created, it must be associated to the data that it is being used to secure. This is accomplished by creating a data...
4 min read
On December 19, 2003, ZertES, the Swiss Federal law regarding the use of certification services with electronic signatures was approved into law.
3 min read
This article explains what an electronic signature policy is from the perspective of a CISO or other person required to maintain information security.