Martin Rupp (guest)

2 min read

Emulator Detection: Key for Mobile Banking & Payment App Security

Attacks on mobile banking and payment applications frequently begin with the use of an emulator for the mobile operating system, where the targeted...

Read More
Why a Key Management System Must Understand ANSI X9.24/TR-31 Key Blocks

3 min read

Why Key Management Systems Need X9.24/TR-31 Key Blocks

The PCI Council requires most actors of payment networks to implement ANSI X9.24/TR-31-compliant key blocks to wrap and securely transmit, transfer,...

Read More
Tokenization-will-reduce-false-declines

4 min read

How Tokenization Reduces Payment False Declines

This article discusses how tokenization may reduce false declines with credit card transactions that could negatively impact merchants.

Read More
Introduction to Cryptographic Key Blocks - FAQs

2 min read

FAQs on Cryptographic Key Blocks and Their Use

This article proposes answers to a series of frequently asked questions (FAQs) about key blocks.

Read More
ANSI X9.24-1-2017: Key Utilization and Storage

3 min read

Key Utilization and Storage in ANSI X9.24-1-2017

This article briefly summarizes the symmetric cryptographic key utilization and storage requirements as described by the ANSI X9.24-1-2017 (part 1)...

Read More
Thales Key Blocks

3 min read

Thales Key Blocks and payShield HSMs: How They Work

Thales Key Blocks are an essential cryptographic key wrapping format. In comparison to other key block formats, they are proprietary and only work...

Read More
Payment Security and Key Blocks: Why are key blocks so secure?

2 min read

Payment Security and Key Blocks: Why are key blocks so secure?

How can keys be securely exchanged over potentially unprotected channels? The answer to this question is “key blocks”. A key block is an essential...

Read More

3 min read

Symmetric Key Creation & Keyshare Generators Explained

In this article, we look at the process of a keyshare generator and key derivation as described by the ANSI X9.24-1-2017 standard. This process is...

Read More

3 min read

Mobile App Hardening: Root and Jailbreak Detection Techniques

Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...

Read More