CRYPTOMATHIC BLOG

 

4 min read

An Overview of Symmetric Encryption and the Key Lifecycle

In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...

Read More
A smartphone wrapped in a thick chain, illustrating the importance of secure storage and key protection for mobile banking and payment apps

3 min read

Secure Storage and Key Protection for Mobile Banking and Payment Apps

The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...

Read More

5 min read

Exploring Secure Cryptographic Devices for Retail Financial Services

The ANSI X9.24-1: 2017 standard requires the use of secure cryptographic devices (SCDs) in the context of symmetric key cryptography and refers to...

Read More
Medieval European castle seen at dusk and illuminated in crimson

2 min read

Mobile Banking and Payment App Anti-Tampering: What You Need to Know

Mobile banking and payment app security is deeply linked to their ability to prevent attackers from tampering with them.

Read More

2 min read

ANSI X9.24-1-2017: An Introduction into Key Blocks

Key Blocks have been invented as a standard way for protecting the integrity of symmetric cryptographic keys and for identifying what the keys can be...

Read More
key blocks

2 min read

PCI Key Block Implementation: Migration Phases & Key Management

In June 2019, the PCI Security Standards Council issued an information supplement titled PCI PIN Security Requirement 18-3 – Key Blocks, which...

Read More

3 min read

The SHA-1 Attack Further Emphasizes the Need for Crypto-Agility 

The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is...

Read More

2 min read

SHA-1 is Practical and Cost-Effective to Crack Now

This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.

Read More

2 min read

ANSI X9.24-1-2017: The General Key Management Requirements

The ANSI X9.24-1-2017 norm details how symmetric cryptographic keys should be managed and handled by the relevant actors of the retail financial...

Read More