Technical and Financial Advantages of Permissioned Blockchains in Banking

Permissioned networks are the ideal solution for banks in building their own blockchain. In this article, we will detail the technical advantages of banking blockchains and how these advantages lead to financial advantages, as well.

Read more

The Key Role of HSMs and Key Management in Secure Permissioned Blockchains for Banking and Payment Services - An Overview

Blockchains are ruled almost entirely by cryptographic mechanisms. These mechanisms mostly involve digital signatures & PKI, hashes, and key derivation.

Read more

Permissioned Blockchains for Banking - Understanding the Technology and Security Aspects

The banking industry is currently rolling out several permissioned blockchain projects.

These are still controlled projects, but so far they demonstrate how powerful a blockchain-enabled banking system could be with respect to gains in effectiveness, security, as well as creating a technical basis for new innovative business models in banking.

Read more

Why Are Permissioned Blockchains a Great Fit for Banking - A Case Study of the Corda Architecture

Permissioned blockchain networks are blockchain networks that are not public, e.g., they require users to apply for membership in order to gain access to them. Such blockchain networks use specific software to operate.

Read more

Why is the Design of Notary Services in Permissioned Blockchains Key to Their Success in Banking?

What is a Notary Service in a Blockchain Network? A notary system is at the root of blockchain, where transactions need to be time-stamped by a trusted authority.

Read more

Understanding the Atalla Command Language

The name Atalla is intimately linked with HSMs. After all, Mohamed Atalla invented the very first hardware security module in 1972. Therefore, it is not surprising that Atalla has also created a way to communicate with HSMs in a very smart way. In this article, we will discuss the Atalla Command Language.

Read more

Using Blockchains and Ecosystem-Integrated HSMs to Achieve Compliant Digital Identity Security

In this article, we shall analyze the way blockchain technology can improve data protection and create a better, and smarter digital identity when used with HSMs.

Read more

NIST's Hybrid Mode Approach to Post-Quantum Computing - why crypto agility is crucial

With the advent of information security, the importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.

Read more

Utimaco ESKM and the Data-Centric Security Problem

Data-centric security is a general concept of software and IT architecture where the data are at the center of the system and prevail over application and network. 

Read more

Ready to take off?

Download our HSM simulator!

Register for free