The mathematical security guard - Recognized worldwide for leading biometric solutions, Morpho goes to great lengths to ensure that individual biometric data and other sensitive information are kept secure. A respected cryptography expert, the company has been using cryptographic techniques since the 1950s to protect access to sensitive information. To stay ahead in a fast-moving field, Morpho undertakes continuous research to develop increasingly secure solutions.

Protecting Data With Mathematics


Cryptography is the art of encoding messages in order to protect the information they contain. Cryptographic and encryption methods go back to ancient times, but today are heavily based on mathematical theory and computer science practices. Designed to protect the confidentiality, authenticity, non repudiation and integrity of the information, cryptographic algorithms are designed around computational hardness assumptions, making them hard to break by an attacker.

Hardening With Hashing Functions

A hashing function is a mathematical function that condenses documents; it is impossible to rebuild the original document from its condensed form. Further, two different documents will necessarily produce two different condensed versions.

Morpho designs proven hashing functions and symmetric and asymmetric encryption algorithms. These cryptographic and encryption tools are employed in encryption equipment, as well as PKI and electronic signature solutions. Thanks to its expertise in the field, Morpho can effectively protect the biometric and/or alphanumeric data that is stored on cards and documents with a chip, like with e-passports, or that is sent over different networks, like with betting and gaming data, Automatic Number Plate Recognition (ANPR), and more.


Algorithms.jpgAs Morpho engages in the research and development of cryptographic and encryption technologies, it builds and maintains a library of algorithms, called primitives. Cryptographic primitives are low-level cryptographic algorithms used to build cryptographic protocols for securing systems and information. These include hashing functions and encryption functions.

An cryptographic algorithm and a key are necessary to encrypt or sign a message. There are several methods:

  • Symmetric key cryptograhy, which allows only two parties to exchange information.
  • Asymmetric key cryptography, based on a system of public and private keys (public key infrastructures, or PKI), can be used to exchange secure information between several parties. Note that asymmetric encryption can guarantee either the confidentiality or the authenticity of a message, but not both at the same time.