4 min read
An Overview of Symmetric Encryption and the Key Lifecycle
In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...
4 min read
In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...
3 min read
The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...
5 min read
The ANSI X9.24-1: 2017 standard requires the use of secure cryptographic devices (SCDs) in the context of symmetric key cryptography and refers to...
2 min read
Mobile banking and payment app security is deeply linked to their ability to prevent attackers from tampering with them.
2 min read
Key Blocks have been invented as a standard way for protecting the integrity of symmetric cryptographic keys and for identifying what the keys can be...
2 min read
In June 2019, the PCI Security Standards Council issued an information supplement titled PCI PIN Security Requirement 18-3 – Key Blocks, which...
3 min read
The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is...
2 min read
This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.
2 min read
The ANSI X9.24-1-2017 norm details how symmetric cryptographic keys should be managed and handled by the relevant actors of the retail financial...