CRYPTOMATHIC BLOG

 

4 min read

Enterprise-Grade Code Signing: Securing the Process

This article outlines the importance of code signing and describes a centralized approach for securing and streamlining the code signing process...

Read More

3 min read

Managing Keys for ATM Remote Key Loading using CKMS

ATM Remote Key Loading has become a common practice in the industry. Yet managing the top-level keys to establish trust between the Host and the ATM...

Read More
Misuse of X.509 Certificates & Keys Involved in SolarWinds Attack

3 min read

Misuse of X.509 Certificates & Keys Involved in SolarWinds Attack

This article discusses the misuse of X.509 certificates and keys in the SolarWinds attack and how Cryptomathic CKMS and CSG could help protect...

Read More

3 min read

How to Simplify Compliance Audits for Key Management Systems

This article explains some of the cryptographic key management tasks involved in demonstrating and proving compliance to acceptable standards, and...

Read More

3 min read

eIDAS & RTS for Strong Customer Authentication

The Delegated Regulation on Regulatory Technical Standards (RTS) by the European Commission aims to facilitate Strong Customer Authentication (SCA)...

Read More

3 min read

Key Management Interoperability: Achievements and Challenges

The Key Management Interoperability Protocol standard intends to provide interoperability across various key management environments and hence to...

Read More
A plain blue lego brick, representing the CEF building blocks

3 min read

EU's CEF Building Blocks: eID, eSignature & eDelivery

The CEF building blocks of the digital service infrastructure, as defined under the Connecting Europe Facility (CEF), cover essential components like...

Read More
The SolarWinds attack and best practices for code-signing

2 min read

Lessons from the SolarWinds Attack: Best Practices

Since the announcement of the SolarWinds supply chain attack, intensive analysis has been done by Crowdstrike, FireEye (with additional details),...

Read More

3 min read

Symmetric Key Creation & Keyshare Generators Explained

In this article, we look at the process of a keyshare generator and key derivation as described by the ANSI X9.24-1-2017 standard. This process is...

Read More