CRYPTOMATHIC BLOG

 

2 min read

The need to manage both symmetric and asymmetric keys

A well-rounded solution for securing digital transactions includes the use of both symmetric and asymmetric cryptography and keys. Each method of...

Read More

3 min read

ANSI X9.24-1-2017: Key Distribution 

Key distribution is perhaps the most important and crucial aspect of the ANSI X9.24-1-2017 part 1 standard. But first, let us explain what...

Read More

5 min read

Symmetric Encryption Algorithms And The Need For Crypto-Agility

In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...

Read More

5 min read

Secure Connectivity for Mobile Banking and Payment Apps: HTTPS Tunneling

In this article, we will describe what HTTPS tunneling is and how it has been used in mobile banking and payment applications. We also look at some...

Read More
protecting-mobile-apps-with-tokens

3 min read

Access Token Protection: Secure Connectivity for Mobile Apps

In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...

Read More

3 min read

The Use of Encryption Modes with Symmetric Block Ciphers

In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...

Read More

2 min read

Overview of App & Code Hardening for Mobile Banking Apps

Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...

Read More

4 min read

An Overview of Symmetric Encryption and the Key Lifecycle

In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...

Read More
A smartphone wrapped in a thick chain, illustrating the importance of secure storage and key protection for mobile banking and payment apps

3 min read

Secure Storage and Key Protection for Mobile Banking and Payment Apps

The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...

Read More