Category: Blog

One of the main discussion topics in new Kiuru MSSP deployments has been the number of keys on the SIM card. Should there be a separate key for signing and authentication? How many PINs can the user actually remember? What …

Number of PKI Keys in Mobile ID Service Read More »

Tagged with: , , , , ,

What are Advanced Electronic Signatures? An advanced electronic signature (AdES) is an electronic signature that meets the requirements defined by the EU Regulation No 910/2014 on electronic identification and trust services for electronic transactions. This regulation is under a standard …

Advanced Electronic Signatures and Mobile ID Read More »

Tagged with: , , , ,

The interoperability of SIM card applets (SIM Toolkit applications) is an important requirement in today’s mobile communication business. It is normal practice for MNOs to have SIM cards from different SIM vendors. These different cards come with different characteristics including …

How to make interoperable authentication applets on SIM cards? Read More »

Tagged with: , ,

Mobile Network Operators (MNOs) across the world are central to the adoption and deployment of Mobile Signature Services such as Mobile ID and Mobile Connect. The purpose of this blog is to describe how uniquely placed MNOs are in driving …

MNOs – Enablers for Mobile Signature Services Read More »

Tagged with: , , ,

The motivation of this blog post is to show an estimation of the time to complete a mobile ID transaction using SMS bearer in some mobile network technologies like 2G, 3G, and 4G. The figure below describes the flow of …

Mobile ID SMS Bearer Latency in Some Mobile Network Technologies Read More »

Tagged with:

The research result on October 2015 from Dutch CWI did estimate that actual finding of two messages that collide producing same hash value will be possible in cost in order of $100 000. See our previous: SHA-1 is no longer considered …

SHA-1 Hash Collision Demonstrated – At Predicted Cost Levels Read More »

The “SIM-less” in this context is a collection of all those techniques that do not use a SIM as a secure tamper proof hardware to implement the place for running the secure element function with a precisely known runtime environment. …

SIM-less authentication Read More »

Some people have questioned if the SMS bearer provides a good user experience and if it is based on a long term technology for Mobile ID. In this blog we try to study this issue and what improvements other wireless communication …

Mobile ID using Faster Bearers Read More »

Tagged with: , , , ,

Kirmo Hovinmaa, technical writer The Internet has forced us humans to rethink communication on a fundamental level. The convenience of being able to exchange ideas without necessarily seeing each other face to face or even being on the same continent …

In Layman’s Terms – Alauda Applet Signature Algorithm Read More »

Tagged with: , , , , , , ,

This blog post is follow up for our MSSP Performance Testing post earlier this year.  Test Results – First Round The first tests we run were focused on the number of CPU cores. Does limiting the core count reduce performance …

MSSP Performance Testing (2/2) Read More »

Tagged with: , ,