CRYPTOMATHIC BLOG

 

HSM

6 min read

Qualified Electronic Signatures – Best Practice Implementation of the Signature Activation Module (SAM)

This article evaluates the implementation options for the Signature Activation Module (SAM) in the context of eIDAS 2. Based on this analysis we...

Read More

1 min read

Secure Your Data in Azure with External Key Management and BYOK

Data security can be complex, but it's essential in today's business world, especially when using cloud services. One effective approach is adopting...

Read More

2 min read

Key Management for HSMS and post-quantum cryptography

In today's fast-evolving digital landscape, robust key management has become an essential part of securing sensitive data and communications. The...

Read More

2 min read

HSM remote key loading using CKMS and PCI-certified KLD

Hardware security modules (HSMs) are physical devices that provide cryptographic functions such as encryption/decryption and digital signing. They...

Read More

3 min read

Secure BYOK for AWS Simple Storage Services (S3)

Cloud storage via AWS Storage Services is a simple, reliable, and scalable way to store, retrieve and share data. As a third-party cloud vendor, AWS...

Read More
Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

5 min read

Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

Today's businesses rely heavily on cryptography to authenticate people and processes, secure communications, and safeguard critical data.

Read More

3 min read

EMV Payment Security - Issuers

An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...

Read More

3 min read

How to Deploy and Manage Cryptography in a Project the Right Way

With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...

Read More

3 min read

Symmetric Cryptography in Financial Institutions: Key Management Challenges

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...

Read More