CRYPTOMATHIC BLOG

 

Open Banking - Success through Agile Alignment of Security Infrastructure, Strategy and Technology

5 min read

Agile Alignment: The Key to Open Banking Success

Open banking can offer opportunities for retail banks that are faced with competition from newcomers to the banking and finance industry. For those...

Read More

6 min read

Advanced or Qualified eIDAS Signatures: What to Choose?

The Electronic Identification and Trust Services Regulation (EU Regulation 910/2014/EC - also known as eIDAS) is a complex set of laws (including...

Read More
eba

3 min read

Strong Customer Authentication Under PSD2: EBA Insights

A fundamental objective of the Revised Payment Services Directive (PSD2) has been to reduce the risk of fraud to the maximum extent possible and...

Read More

3 min read

Postbank Master Key Breach: Strong Key Management Importance

In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...

Read More

4 min read

Understanding Tokenization in Banking and Finance

Tokenization is a generalized concept of a cryptographic hash. It means representing something by a symbol (‘token’).

Read More

3 min read

Why a Banking KMS Must Support Atalla Key Blocks

Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...

Read More
A person peeping through a set of white Venetian blinds

3 min read

Why Native Code Obfuscation is Essential for Mobile Apps

In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...

Read More

5 min read

W3C's suggestion for a Web Cryptography API

The World Wide Web Consortium or W3C as it is commonly known was founded in 1994 by the original architect of the World Wide Web, Tim Berners-Lee. It...

Read More

8 min read

How to Secure the Lifecycle of Cryptographic Keys

This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...

Read More