Martin Rupp (guest)

An Overview of the Different Key Block Formats

2 min read

Understanding Key Block Formats and Applications

A key block is a unique piece of cryptography that is used to protect cryptographic keys while they are being sent over networks that might not be...

Read More
Payment & Banking: An Introduction to z/OS and the IBM Common Cryptographic Architecture

4 min read

Introduction to z/OS & IBM Cryptographic Architecture

IBM’s mainframe computers have been a rock-steady part of banks’ security infrastructure for many years. Originating from the local data-center...

Read More
A detailed diagram showing the various steps involved in mobile payment tokenization

4 min read

How Tokenization Secures Mobile Payment Applications

The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. Analysts...

Read More

3 min read

IBM CCA & the Importance of Banking-grade Key Management

The IBM Common Cryptographic Architecture (CCA) is a cryptographic platform providing several functions of special interest for securing financial...

Read More
Converting Key Blocks from one to another One Format to Another: How It’s Done and in Which Sectors

2 min read

How to Convert Key Blocks: Techniques and Examples

There are several types of key block formats used in different industries, especially the retail banking industry. The systems that use these key...

Read More
Payment Security - Cardholders

4 min read

EMV Payment Security for Cardholders: Overview & Practices

Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment...

Read More

3 min read

Mobile Banking Security: Data Obfuscation Techniques

Code obfuscation is one of the most effective techniques for protecting sensitive data in mobile banking and payment apps. However, it's not always...

Read More
ANSI X9.24-1-2017: Key Replacement, Destruction, and Archiving

2 min read

ANSI X9.24-1-2017: Key Replacement, Destruction, and Archiving

One aspect of key management is dealing with what happens when a symmetric cryptographic key is no longer needed. The section ‘Key Replacement,...

Read More

2 min read

ANSI X9.24-1-2017: A Guide to Key Loading Standards

The ANSI X9.24-1-2017 standard defines the requirements for the loading of key components or shares, and the loading of cleartext keys. The loading...

Read More