5 min read
Symmetric Encryption Algorithms And The Need For Crypto-Agility
In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...
5 min read
In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...
5 min read
In this article, we will describe what HTTPS tunneling is and how it has been used in mobile banking and payment applications. We also look at some...
3 min read
In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...
3 min read
In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...
2 min read
Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...
4 min read
In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...
3 min read
The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...
5 min read
The ANSI X9.24-1: 2017 standard requires the use of secure cryptographic devices (SCDs) in the context of symmetric key cryptography and refers to...
2 min read
Mobile banking and payment app security is deeply linked to their ability to prevent attackers from tampering with them.