CRYPTOMATHIC BLOG

 

EMV

1 min read

Unveiling Obsidian: The Next-Gen Payment Platform for the Cloud Era

We are delighted to announced the launch of Obsidian, a cutting-edge payment platform designed to meet the evolving needs of the payment industry....

Read More

4 min read

Exploring The EMV Personalization Process

EMV Personalization of a payment card is the process of writing data to the card in order to make it ready for use. This includes loading the card...

Read More
Cardholder, Merchant, Issuer & Acquirer - The Four Corners Model for Payment Security and Key Management

4 min read

The Four Corners Model for Card Payment Security and Key Management

The “Four Corners” model, also called the “Four Party Scheme”, is utilized in almost all standard card payment systems across the globe. Here, we...

Read More

3 min read

EMV Personalization cryptographic requirements 

EMV Personalization is a process used to get card data into cards, mobile phones, and wearables. The process includes a variety of complicated...

Read More

4 min read

EMV Payment Security - Acquirers

In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating...

Read More

3 min read

EMV Payment Security - Issuers

An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...

Read More
A Brief Overview of the Challenges Involved in Key Management for EMV Personalization : The Main Actors of EMV Personalization

3 min read

Key Management Challenges for EMV Personalization

The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in...

Read More
Payment Security - Cardholders

4 min read

EMV Payment Security - Cardholders

Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment...

Read More
Methods_of_maximizing_the_security_protection_of_a_cryptographic_system.jpg

5 min read

Maximizing Payment Card Industry (PCI) & Cryptographic System Security

This article talks about how different factors and controls can affect the strength and effectiveness of a cryptographic system's security. It gives...

Read More