Author: Matti Aarnio

ROCA – Vulnerable RSA Key Generation on Some Smart Cards

Latest news on smart card based security solutions tells that once again one vendor has produced low quality firmware for RSA key generation. What makes it even worse is that this hazard was caught up only after cards had been

Tagged with: ,

Advanced Electronic Signatures and Mobile ID

What are Advanced Electronic Signatures? An advanced electronic signature (AdES) is an electronic signature that meets the requirements defined by the EU Regulation No 910/2014 on electronic identification and trust services for electronic transactions. This regulation is under a standard

Tagged with: , , , ,

Mobile ID SMS Bearer Latency in Some Mobile Network Technologies

The motivation of this blog post is to show an estimation of the time to complete a mobile ID transaction using SMS bearer in some mobile network technologies like 2G, 3G, and 4G. The figure below describes the flow of

Tagged with:

SHA-1 Hash Collision Demonstrated – At Predicted Cost Levels

The research result on October 2015 from Dutch CWI did estimate that actual finding of two messages that collide producing same hash value will be possible in cost in order of $100 000. See our previous: SHA-1 is no longer considered

Meet us at MWC2017

Methics will be exhibiting the Kiuru MSSP solution for Mobile ID and Mobile Connect Services at the Mobile World Congress 2017. Meet us at the Finland Pavilion, stand 5F31 in Hall 5, where we will be exhibiting the solution. Please reserve a meeting with

Tagged with: ,

Methics at AfricaCom 2016 – 15th to 17th November, 2016

The AfricaCom is the largest and most influential Africa-focused tech event in the world – the meeting place for those driving Africa’s digital transformation. With the theme: “Economic Development and Social Empowerment through Digital Connectivity”, AfricaCom 2016, aims to elevate

SIM-less authentication

The “SIM-less” in this context is a collection of all those techniques that do not use a SIM as a secure tamper proof hardware to implement the place for running the secure element function with a precisely known runtime environment.

Mobile ID using Faster Bearers

Some people have questioned if the SMS bearer provides a good user experience and if it is based on a long term technology for Mobile ID. In this blog we try to study this issue and what improvements other wireless communication

Tagged with: , , , ,

Methics at the 6th NGMN Industry Conference & Exhibition

The 6th NGMN Industry Conference & Exhibition will take place in Frankfurt (Germany) from 12th to 13th October 2016. Key focus will be on operator and industry requirements on 5G, initial 5G technology solutions and related test results, on 5G

SHA-1 is no longer to be considered Secure

Abstract: The long expected (by cryptographers) news is that it is becoming moderately cheap to find collisions on SHA-1 hash algorithm. Current cost estimate is $75k – $120k of Amazon EC2 CPU/GPU resources, and this cost is expected to go down

Tagged with: ,
Top