CRYPTOMATHIC BLOG

 

3 min read

Is Your Crypto Due a Service?

Recent revelations in the press have caused industry experts to question just how much trust can be placed in existing cryptographic standards or...

Read More
Secure Mobile Transactions – Fact or Fiction? Part 2 of 2

3 min read

Secure Mobile Transactions – Fact or Fiction? Part 2 of 2

...continued from Part 1 The threat model Malicious mobile device hackers have a variety of goals. Foremost is monetary gain, but retribution,...

Read More

3 min read

Secure Mobile Transactions – Fact or Fiction? Part 1 of 2

With mobile devices being used for more credentialing based activities, the question of mobile security is becoming increasingly important. The...

Read More
Random Dice

6 min read

The Weakest Link in Many Cryptosystems – Part 1 of 2

Introduction It is well-known and appreciated by most users - even if often ignored(!) - that if you choose a weak password, you are exposing...

Read More

6 min read

The Trusted Platform Module Explained

Introducing the TPM The Trusted Platform Module (TPM) is a special purpose microcontroller designed by the Trusted Computing Group, which interfaces...

Read More
Fully_Homomorphic_encryption.jpg

2 min read

Fully Homomorphic Encryption

- hype or the answer to all our prayers? A couple of years ago, Craig Gentry produced a break-through result in cryptography: what researchers had...

Read More
Digital_rights_management_protection.jpg

3 min read

Digital Rights Management Protection

In 2004, Intel, Nokia, Panasonic, and Samsung, announced plans for a licensing and compliance framework called Content Management License...

Read More
Are the Dynamics of Card Fraud Changing?

4 min read

Are the Dynamics of Card Fraud Changing?

In 2009, the RBS WorldPay ATM network reportedly lost $9 million to a 30 minute fraud attack across 49 cities, in different countries, using just 100...

Read More
KMS1

4 min read

GlobalPlatform Key Management System

This article provides an overview of GlobalPlatform (GP) Key Management and includes a proposed architecture for an efficient GP Key Management...

Read More