CRYPTOMATHIC BLOG

 

Manual vs. Automated Key Management

4 min read

Manual vs. Automated Key Management

This article evaluates and compares manual and automated cryptographic key management. It looks at security-related issues as well as organizational...

Read More

3 min read

Digital Identity: How Social Media Is Changing How We Authenticate

Throughout the last decade, social media has played a vital part in our lives and has significantly shaped the younger generations.

Read More
Using 3D-Secure and Device Fingerprints for EMV Payments Against CNP Fraud

3 min read

Using 3D-Secure & Device Fingerprints for EMV Payments Against CNP Fraud

Credit cardholders are generally protected from liability if unauthorized transactions are made with their credit cards because of consumer...

Read More

3 min read

HTTPS Encryption & Authentication Threats in Banking

This article discusses the secure HTTPS Protocol intended for web-resources and its principles of operation as well as its strengths and weaknesses....

Read More
Digital Authentication - the basics

5 min read

What You Need to Know About Digital Authentication

When it comes to conducting transactions, the possibility of fraud is always a risk that cannot be overlooked. In person, an individual may present...

Read More

3 min read

Applying Cryptographic Security Services - a NIST summary

This article summarizes the basic cryptographic security services described in NIST Special Publication 800-57 (1, rev.4) for Key Management that can...

Read More

4 min read

EMV & PCI DSS Compliance: Cryptography and Key Management Requirements

EMV chips on payment cards contain cryptographic co-processors and dual interfaces that allow for contact and contactless payment options. When...

Read More

3 min read

Understanding: Can Digital Signatures Provide True Non-Repudiation

Non-repudiation is a legal concept that is widely used in information security. It refers to any service which provides proof of the origin of data...

Read More

2 min read

A Summary of Revised NIST Key Management Standards

Cryptography is the foundation of protecting electronic data and cyber security. Encryption can effectively prevent breaches while also protecting...

Read More