CRYPTOMATHIC BLOG

 

5 min read

Exploring Secure Cryptographic Devices for Retail Financial Services

The ANSI X9.24-1: 2017 standard requires the use of secure cryptographic devices (SCDs) in the context of symmetric key cryptography and refers to...

Read More
Medieval European castle seen at dusk and illuminated in crimson

2 min read

Mobile Banking and Payment App Anti-Tampering: What You Need to Know

Mobile banking and payment app security is deeply linked to their ability to prevent attackers from tampering with them.

Read More

2 min read

ANSI X9.24-1-2017: An Introduction into Key Blocks

Key Blocks have been invented as a standard way for protecting the integrity of symmetric cryptographic keys and for identifying what the keys can be...

Read More
key blocks

2 min read

PCI Key Block Implementation: Migration Phases & Key Management

In June 2019, the PCI Security Standards Council issued an information supplement titled PCI PIN Security Requirement 18-3 – Key Blocks, which...

Read More

3 min read

The SHA-1 Attack Further Emphasizes the Need for Crypto-Agility 

The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is...

Read More

2 min read

SHA-1 is Practical and Cost-Effective to Crack Now

This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.

Read More

2 min read

ANSI X9.24-1-2017: The General Key Management Requirements

The ANSI X9.24-1-2017 norm details how symmetric cryptographic keys should be managed and handled by the relevant actors of the retail financial...

Read More
FIPS-security-cryptomathic

3 min read

Understanding The New FIPS 140-3

FIPS 140 (“Federal Information Processing Standard”) is a series of security standards published by the U.S. government that specify security...

Read More

4 min read

Symmetric Key Encryption - why, where and how it’s used in banking

In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...

Read More