CRYPTOMATHIC BLOG

 

Key Management (2)

4 min read

Exploring The EMV Personalization Process

EMV Personalization of a payment card is the process of writing data to the card in order to make it ready for use. This includes loading the card...

Read More

3 min read

Cryptomathic AWS BYOK: Secure Scalability, Durability & Availability

In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must...

Read More
BYOK is Essential for Data Security and Privacy as Business-Critical Applications Move to the Cloud

3 min read

Why BYOK is Essential for Data Security and Privacy in the Cloud

The 2020 Oracle and KPMG Cloud Threat Report focuses on the key risks and challenges organizations face as they implement and maintain cloud...

Read More
TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

4 min read

TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

Among all the various key block formats, the TR-34 format is undoubtedly one of the most sophisticated. The TR-34 norm is an implementation of the...

Read More

3 min read

EU AWS Hosting: Data Sovereignty & GDPR Compliance

This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.

Read More
Explaining the Java ECDSA Critical Vulnerability

3 min read

The Java ECDSA Vulnerability: What You Need to Know

On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.

Read More
Classification-cryptpgrapjic-keys

5 min read

Classification of Cryptographic Keys

This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...

Read More

3 min read

How EMV Payment Security Works for Issuers

An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...

Read More
An Overview of the Different Key Block Formats

2 min read

Understanding Key Block Formats and Applications

A key block is a unique piece of cryptography that is used to protect cryptographic keys while they are being sent over networks that might not be...

Read More