CRYPTOMATHIC BLOG

 

3DES

Classification-cryptpgrapjic-keys

5 min read

Classification of Cryptographic Keys

This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...

Read More

6 min read

Managing Risks in Cryptographic Key Management

With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...

Read More

3 min read

Crypto-Abstraction Layer: What You Need to Know

A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...

Read More

5 min read

Symmetric Encryption Algorithms And The Need For Crypto-Agility

In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...

Read More
Quantum-Cryptography

5 min read

Quantum Computing: The Future of Cryptography

“Quantum computing” is computation performed using a computing device based on the strange, counter-intuitive physical properties of matter at very...

Read More

3 min read

What Is Crypto-Agility? A Full Overview

Crypto-agility, or cryptographic agility, is the capacity for an information security system to adopt an alternative to the original encryption...

Read More
3DES is Officially Being Retired

3 min read

3DES Encryption Standard Is Officially Retired

According to draft guidance published by NIST on July 19, 2018, the Triple Data Encryption Algorithm (TDEA) or 3DES is officially being retired. The...

Read More

7 min read

Using PKI for EMV Cards in PCI DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard to prevent credit card scams and numerous additional...

Read More