Martin Rupp (guest)

2 min read

Overview of App & Code Hardening for Mobile Banking Apps

Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...

Read More
A smartphone wrapped in a thick chain, illustrating the importance of secure storage and key protection for mobile banking and payment apps

3 min read

Secure Storage and Key Protection for Mobile Banking and Payment Apps

The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...

Read More

5 min read

Exploring Secure Cryptographic Devices for Retail Financial Services

The ANSI X9.24-1: 2017 standard requires the use of secure cryptographic devices (SCDs) in the context of symmetric key cryptography and refers to...

Read More
Medieval European castle seen at dusk and illuminated in crimson

2 min read

Mobile Banking and Payment App Anti-Tampering: What You Need to Know

Mobile banking and payment app security is deeply linked to their ability to prevent attackers from tampering with them.

Read More

2 min read

ANSI X9.24-1-2017: An Introduction into Key Blocks

Key Blocks have been invented as a standard way for protecting the integrity of symmetric cryptographic keys and for identifying what the keys can be...

Read More

2 min read

ANSI X9.24-1-2017: The General Key Management Requirements

The ANSI X9.24-1-2017 norm details how symmetric cryptographic keys should be managed and handled by the relevant actors of the retail financial...

Read More

4 min read

Understanding the Card Payment Environment and Symmetric Key Use

The standard, ANSI X9.24-1-2017 part 1 has been written to provide minimum symmetric key management requirements and guidelines for the retail...

Read More

2 min read

An Introduction into ANSI X9.24-1-2017 part 1

ANSI X9.24-1-2017 part 1 is a standard that deals with symmetric key management techniques for retail financial services.

Read More

3 min read

NIST & FIPS Considerations for EMV Tokenization

In this article, we will review some of the constraints of an EMV tokenization solution when it comes to FIPS and more generally, NIST considerations.

Read More