CRYPTOMATHIC BLOG

 

3 min read

Understanding Symmetric Key Creation, Components & Keyshare Generators

In this article, we look at the process of a keyshare generator and key derivation as described by the ANSI X9.24-1-2017 standard. This process is...

Read More
Bring Your Own Key (BYOK) to the Google Cloud Brings New Opportunities to Financial Institutions

5 min read

BYOK for Google Cloud Unlocks Opportunities for Financial Institutions

This article discusses the concerns surrounding key management for cloud environments and how Cryptomathic addresses them by bringing banking-grade...

Read More
Man in a blue checked shirt sitting at a desk with a cup of coffee, working on his laptop

2 min read

E-signatures vs Digital Signatures: Key Differences and Regulations

People often use the terms e-signature and digital signature interchangeably. However, they aren't the same thing. Everything from the processes that...

Read More
Diagram showing the different layers of mobile app security

5 min read

Common Mobile Banking App Security Issues and How to Solve Them

An investigation conducted by "Which?", a consumer watchdog group based in the UK, found serious vulnerabilities in the security of banking security...

Read More

2 min read

Protecting Mobile Banking and Payment Apps from Malicious Attacks

We are constantly reminded by news stories how complex it can be to secure mobile banking and payments apps. A recent study has found that 11%...

Read More

3 min read

Introduction into PAdES for Trust Service Providers

The term PAdES stands for PDF Advanced Electronic Signatures. It refers to a group of extensions and restrictions that are used with PDF and ISO...

Read More

3 min read

Mobile App Hardening: Root and Jailbreak Detection

Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...

Read More
What is Quantum Computing and how does it relate to today’s Cryptography Infrastructure Investments

3 min read

Quantum Computing and Cryptography Infrastructure Investments

The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating...

Read More

3 min read

Recommendations for Providing Digital Signature Services

With the ever-growing number of electronic transactions and documents, the use of digital signatures make it possible to trust and act upon these...

Read More