2 min read
The need to manage both symmetric and asymmetric keys
A well-rounded solution for securing digital transactions includes the use of both symmetric and asymmetric cryptography and keys. Each method of...
2 min read
A well-rounded solution for securing digital transactions includes the use of both symmetric and asymmetric cryptography and keys. Each method of...
3 min read
Key distribution is perhaps the most important and crucial aspect of the ANSI X9.24-1-2017 part 1 standard. But first, let us explain what...
5 min read
In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...
5 min read
In this article, we will describe what HTTPS tunneling is and how it has been used in mobile banking and payment applications. We also look at some...
3 min read
In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...
3 min read
In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...
2 min read
Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...
4 min read
In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...
3 min read
The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...