3 min read
Understanding The New FIPS 140-3
FIPS 140 (“Federal Information Processing Standard”) is a series of security standards published by the U.S. government that specify security...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
3 min read
FIPS 140 (“Federal Information Processing Standard”) is a series of security standards published by the U.S. government that specify security...
4 min read
In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...
6 min read
A system's cryptographic protection against attacks and malicious penetration is determined by two factors: (1) the strength of the keys and the...
3 min read
PCI PTS HSM compliance is mandated on banks, acquirers, processors and all other players involved in payment card systems. This article explores the...
4 min read
Cryptographic algorithms can be categorized into three classes: hash functions, symmetric, and asymmetric algorithms. This article sheds light on...
5 min read
This article introduces and classifies cryptographic key types and crypto-periods as suggested by NIST, based on proven best practices for key...
3 min read
Financial institutions and solution providers are busy implementing the requirements of Strong Customer Authentication (SCA) under the Revised...
6 min read
This article discusses the benefits eIDs provide for both banks and customers in streamlining cross-border transactions and what is required under...
2 min read
This article explains the concept of meta-data in the context of cryptographic keys, explaining why it is used and the necessity to manage it well.