CRYPTOMATHIC BLOG

 

4 min read

EMV & PCI DSS Compliance: Cryptography and Key Management Requirements

EMV chips on payment cards contain cryptographic co-processors and dual interfaces that allow for contact and contactless payment options. When...

Read More

3 min read

Understanding: Can Digital Signatures Provide True Non-Repudiation

Non-repudiation is a legal concept that is widely used in information security. It refers to any service which provides proof of the origin of data...

Read More

2 min read

A Summary of Revised NIST Key Management Standards

Cryptography is the foundation of protecting electronic data and cyber security. Encryption can effectively prevent breaches while also protecting...

Read More

3 min read

NIST Digital Authentication Implementation (SP 800-63-3)

In 2016, the National Institute of Standards and Technology (NIST) (run by the US Department of Commerce) announced they were producing a new...

Read More

7 min read

Digital authentication - factors, mechanisms and schemes

Indiana University defines authentication as "the process of determining whether someone or something is who or what it is declared to be."...

Read More

4 min read

US Court Rejects DocuSign E-Signatures for Digital Authorization

An interesting case arose in the state of California this year regarding a bankruptcy lawyer who utilized DocuSign for many official legal documents.

Read More
Digital signatures in mobile banking and payment processing

3 min read

Mobile Banking Enhanced with Digital Signatures

Over the past 8-10 years, we’ve witnessed a huge rise in the use and application of mobile banking. At first we could check our account balances and...

Read More

3 min read

How eIDAS Affects the US: Key Considerations

On July 1st 2016, eIDAS was introduced in the EU to replace the almost 20 year old European Signatures Directive. The directive was originally built...

Read More

3 min read

Understanding non-repudiation of origin & non-repudiation of emission

This article sheds light on the two approaches to achieve non-repudiation of an electronic message: non-repudiation of emission and non-repudiation...

Read More