CRYPTOMATHIC BLOG

 

Why a Key Management System Must Understand ANSI X9.24/TR-31 Key Blocks

3 min read

Why Key Management Systems Need X9.24/TR-31 Key Blocks

The PCI Council requires most actors of payment networks to implement ANSI X9.24/TR-31-compliant key blocks to wrap and securely transmit, transfer,...

Read More

5 min read

The Weakest Link in Many Cryptosystems - Part 2 of 2

RSA, a short recap In a public key scheme, and for the sake of simplicity, assume a public scheme based on encryption-decryption (as opposed to e.g....

Read More
What_is_the_right_user_interface_for_a_key_management_system.jpg

2 min read

What is the right user interface for a Key Management System?

User interface design and usability are the deciding factors in attaining a good user experience for most IT deployments, including key management...

Read More
Understanding the Concepts of Bring Your Own Key

3 min read

Understanding BYOK: Bring Your Own Key Explained

Bring your own key (BYOK) is a popular term relating to key management for cloud applications. However, a lack of standardization makes it confusing...

Read More
IBM's z15 Mainframe - Security, Resilience and Secure Key Management for Financial Service Platforms

3 min read

IBM z15 Mainframe: Key Management & Resilience

Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...

Read More
Tokenization-will-reduce-false-declines

4 min read

How Tokenization Reduces Payment False Declines

This article discusses how tokenization may reduce false declines with credit card transactions that could negatively impact merchants.

Read More

3 min read

Crypto-Abstraction Layer: What You Need to Know

A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...

Read More
Introduction to Cryptographic Key Blocks - FAQs

2 min read

FAQs on Cryptographic Key Blocks and Their Use

This article proposes answers to a series of frequently asked questions (FAQs) about key blocks.

Read More
commoncriteria_logo

3 min read

How Common Criteria Helps Organizations Choose the Right HSM

Hardware Security Modules (HSMs) are used in all card payment systems (as well as various other applications that require strong security) to protect...

Read More