4 min read
An Overview of Symmetric Encryption and the Key Lifecycle
In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
4 min read
In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...
2 min read
In June 2019, the PCI Security Standards Council issued an information supplement titled PCI PIN Security Requirement 18-3 – Key Blocks, which...
2 min read
This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.
3 min read
FIPS 140 (“Federal Information Processing Standard”) is a series of security standards published by the U.S. government that specify security...
4 min read
In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...
6 min read
A system's cryptographic protection against attacks and malicious penetration is determined by two factors: (1) the strength of the keys and the...
3 min read
PCI PTS HSM compliance is mandated on banks, acquirers, processors and all other players involved in payment card systems. This article explores the...
4 min read
Cryptographic algorithms can be categorized into three classes: hash functions, symmetric, and asymmetric algorithms. This article sheds light on...
5 min read
This article introduces and classifies cryptographic key types and crypto-periods as suggested by NIST, based on proven best practices for key...