Author: Matti Aarnio

Advanced Electronic Signatures and Mobile ID

What are Advanced Electronic Signatures? An advanced electronic signature (AdES) is an electronic signature that meets the requirements defined by the EU Regulation No 910/2014 on electronic identification and trust services for electronic transactions. This regulation is under a standard

Posted in Blog Tagged with: , , , ,

Mobile ID SMS Bearer Latency in Some Mobile Network Technologies

The motivation of this blog post is to show an estimation of the time to complete a mobile ID transaction using SMS bearer in some mobile network technologies like 2G, 3G, and 4G. The figure below describes the flow of

Posted in Blog Tagged with:

SHA-1 Hash Collision Demonstrated – At Predicted Cost Levels

The research result on October 2015 from Dutch CWI did estimate that actual finding of two messages that collide producing same hash value will be possible in cost in order of $100 000. See our previous: SHA-1 is no longer considered

Posted in Blog

Meet us at MWC2017

Methics will be exhibiting the Kiuru MSSP solution for Mobile ID and Mobile Connect Services at the Mobile World Congress 2017. Meet us at the Finland Pavilion, stand 5F31 in Hall 5, where we will be exhibiting the solution. Please reserve a meeting with

Posted in News Tagged with: ,

Methics at AfricaCom 2016 – 15th to 17th November, 2016

The AfricaCom is the largest and most influential Africa-focused tech event in the world – the meeting place for those driving Africa’s digital transformation. With the theme: “Economic Development and Social Empowerment through Digital Connectivity”, AfricaCom 2016, aims to elevate

Posted in News

SIM-less authentication

The “SIM-less” in this context is a collection of all those techniques that do not use a SIM as a secure tamper proof hardware to implement the place for running the secure element function with a precisely known runtime environment.

Posted in Blog

Mobile ID using Faster Bearers

Some people have questioned if the SMS bearer provides a good user experience and if it is based on a long term technology for Mobile ID. In this blog we try to study this issue and what improvements other wireless communication

Posted in Blog Tagged with: , , , ,

Methics at the 6th NGMN Industry Conference & Exhibition

The 6th NGMN Industry Conference & Exhibition will take place in Frankfurt (Germany) from 12th to 13th October 2016. Key focus will be on operator and industry requirements on 5G, initial 5G technology solutions and related test results, on 5G

Posted in News

SHA-1 is no longer to be considered Secure

Abstract: The long expected (by cryptographers) news is that it is becoming moderately cheap to find collisions on SHA-1 hash algorithm. Current cost estimate is $75k – $120k of Amazon EC2 CPU/GPU resources, and this cost is expected to go down

Posted in Blog Tagged with: ,

Agile Geo-redundancy for MSSP

In a modern city environment there are many dangers that can unexpectedly break service availability. Commonly it is an excavator breaking a critical cable, or critical equipment failing in the server room. We need technology to defend our services from

Posted in Blog Tagged with: ,