Category: Blog

Mobile ID SMS Bearer Latency in Some Mobile Network Technologies

The motivation of this blog post is to show an estimation of the time to complete a mobile ID transaction using SMS bearer in some mobile network technologies like 2G, 3G, and 4G. The figure below describes the flow of

Posted in Blog

SHA-1 Hash Collision Demonstrated – At Predicted Cost Levels

The research result on October 2015 from Dutch CWI did estimate that actual finding of two messages that collide producing same hash value will be possible in cost in order of $100 000. See our previous: SHA-1 is no longer considered

Posted in Blog

SIM-less authentication

The “SIM-less” in this context is a collection of all those techniques that do not use a SIM as a secure tamper proof hardware to implement the place for running the secure element function with a precisely known runtime environment.

Posted in Blog

Mobile ID using Faster Bearers

Some people have questioned if the SMS bearer provides a good user experience and if it is based on a long term technology for Mobile ID. In this blog we try to study this issue and what improvements other wireless communication

Posted in Blog Tagged with: , , , ,

In Layman’s Terms – Alauda Applet Signature Algorithm

Kirmo Hovinmaa, technical writer The Internet has forced us humans to rethink communication on a fundamental level. The convenience of being able to exchange ideas without necessarily seeing each other face to face or even being on the same continent

Posted in Blog Tagged with: , , , , , , ,

MSSP Performance Testing (2/2)

This blog post is follow up for our MSSP Performance Testing post earlier this year.  Test Results – First Round The first tests we run were focused on the number of CPU cores. Does limiting the core count reduce performance

Posted in Blog Tagged with: , ,

Global Telecommunications Study: Navigating the Road to 2020

The 2015 Global Telecommunications Study has been conducted by EY. It gives a first hand industry perspective to the telco market. “The telco of 2020 cannot be a bad copy of the telco of 2015.” The report collects the outputs

Posted in Blog Tagged with: , ,

MSSP Performance Testing (1/2)

We recently bought a new Proliant server for running performance tests and now we can dedicate one server for testing only. The problem was defining and setting up an optimal test environment on said server. Our requirements for the test

Posted in Blog Tagged with: , , , , ,

MSS Roaming

In Mobile Signature Service (MSS), messages are routed between Mobile Signature Service Providers (MSSPs). Interconnected MSSPs are called a Mesh. The point of interconnecting MSSPs is that Application Providers (APs) can reach any Mobile User that’s connected to any of the

Posted in Blog Tagged with: , , , ,

SHA-1 is no longer to be considered Secure

Abstract: The long expected (by cryptographers) news is that it is becoming moderately cheap to find collisions on SHA-1 hash algorithm. Current cost estimate is $75k – $120k of Amazon EC2 CPU/GPU resources, and this cost is expected to go down

Posted in Blog Tagged with: ,