CRYPTOMATHIC BLOG

 

Digital signature deployment models for banking - Operating as an eIDAS Compliant Registration Authority Reduces Costs and Preserves Customer Ownership

3 min read

How Digital Signature Deployment Models Optimise eIDAS Implementation

The eIDAS regulation provides both the technical and legal framework for electronic identification and digital signatures that the banking sector...

Read More
Common Key Management System Models for the Cloud

5 min read

Common Key Management System Models for the Cloud

This article explains the four primary cloud KMS pattern combinations and which are best suited for use with Cryptomathic’s Key Management System...

Read More
eIDAS Trust Services – Strengths and Challenges in Implementation

3 min read

eIDAS Trust Services – Strengths and Challenges in Implementation

A study published in early 2018 by the European Union Agency for Network and Information Security (ENISA), revealed that 90% of the respondents...

Read More
Why a Key Management System Must Understand ANSI X9.24/TR-31 Key Blocks

3 min read

Why Key Management Systems Must Understand ANSI X9.24/TR-31 Key Blocks

The PCI Council requires most actors of payment networks to implement ANSI X9.24/TR-31-compliant key blocks to wrap and securely transmit, transfer,...

Read More

5 min read

The Weakest Link in Many Cryptosystems - Part 2 of 2

RSA, a short recap In a public key scheme, and for the sake of simplicity, assume a public scheme based on encryption-decryption (as opposed to e.g....

Read More
What_is_the_right_user_interface_for_a_key_management_system.jpg

2 min read

What is the right user interface for a Key Management System?

User interface design and usability are the deciding factors in attaining a good user experience for most IT deployments, including key management...

Read More
Understanding the Concepts of Bring Your Own Key

3 min read

Understanding the Concepts of Bring Your Own Key

Bring your own key (BYOK) is a popular term relating to key management for cloud applications. However, a lack of standardization makes it confusing...

Read More
IBM's z15 Mainframe - Security, Resilience and Secure Key Management for Financial Service Platforms

4 min read

IBM z15 Mainframe & Secure Key Management for FS Platforms

Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...

Read More
Building Security Systems for the Internet of Things and Crypto Agility

4 min read

Crypto Agility and IoT: Building Security Systems

There is no silver bullet when it comes to securing “the” Internet of Things; instead, a careful analysis of the individual application is needed. In...

Read More