CRYPTOMATHIC BLOG

 

4 min read

EMV Payment Security - Acquirers

In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating...

Read More

3 min read

Digital vs Wet Signatures: The Impact of Forgery On House Buying

Mortgage fraud is a serious crime. Once executed and signed, a mortgage deed is a legally binding contract. The responsibility of trying to prove...

Read More

5 min read

E-Government Authentication & Signing: Centralized Solutions

Achieve Non-Repudiation of Origin (NRO) and Non-Repudiation of Emission (NRE)

Read More
Classification-cryptpgrapjic-keys

5 min read

Classification of Cryptographic Keys

This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...

Read More

3 min read

How EMV Payment Security Works for Issuers

An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...

Read More
A Brief Overview of the Challenges Involved in Key Management for EMV Personalization : The Main Actors of EMV Personalization

3 min read

Challenges in Key Management for EMV Personalization

The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in...

Read More
An Overview of the Different Key Block Formats

2 min read

Understanding Key Block Formats and Applications

A key block is a unique piece of cryptography that is used to protect cryptographic keys while they are being sent over networks that might not be...

Read More
Payment & Banking: An Introduction to z/OS and the IBM Common Cryptographic Architecture

4 min read

Introduction to z/OS & IBM Cryptographic Architecture

IBM’s mainframe computers have been a rock-steady part of banks’ security infrastructure for many years. Originating from the local data-center...

Read More

3 min read

Introducing the Signature Activation Protocol for Remote Signing

This article explains the digital Signature Activation Protocol (SAP) in the context of eIDAS-compliant central signing. It sheds light on its...

Read More