CRYPTOMATHIC BLOG

 

6 min read

The Weakest Link in Many Cryptosystems – Part 1 of 2

Introduction It is well-known and appreciated by most users - even if often ignored(!) - that if you choose a weak password, you are exposing...

Read More

6 min read

Understanding the Trusted Platform Module (TPM)

Introducing the TPM The Trusted Platform Module (TPM) is a special purpose microcontroller designed by the Trusted Computing Group, which interfaces...

Read More

4 min read

GlobalPlatform Key Management System

This article provides an overview of GlobalPlatform (GP) Key Management and includes a proposed architecture for an efficient GP Key Management...

Read More
Authenticated_encryption.jpg

3 min read

Authenticated Encryption: Enhancing Data Security

A New Cryptographic Primitive? By far the oldest and perhaps also the best-known goal of cryptographic methods is the protection of secrecy, or...

Read More

4 min read

TSM Solutions: 3rd Party SIM Card Management

Trusted Service Manager (TSM) is a relatively new role required in a mobile Near Field Communication (NFC) ecosystem. The core services a Trusted...

Read More