CRYPTOMATHIC BLOG

 

Key Management (6)

2 min read

BYOK: a Solution for EBA’s New ICT and Security Risk Management Guidelines

The European Banking Authority's (EBA’s) new ICT and Security Risk Management Guidelines provide guidance for cybersecurity requirements for...

Read More

3 min read

Postbank Master Key Breach: Why Strong Key Management is Essential

In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...

Read More

3 min read

Why a Banking Key Management System Must Support Atalla Key Blocks

Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...

Read More

8 min read

Securing the Life-cycle of a Cryptographic Key

This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...

Read More

6 min read

Symmetric Cryptography & Key Management: Exhaustion, Rotation, Defence

With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of...

Read More

2 min read

The need to manage both symmetric and asymmetric keys

A well-rounded solution for securing digital transactions includes the use of both symmetric and asymmetric cryptography and keys. Each method of...

Read More

3 min read

ANSI X9.24-1-2017: Key Distribution 

Key distribution is perhaps the most important and crucial aspect of the ANSI X9.24-1-2017 part 1 standard. But first, let us explain what...

Read More

3 min read

The Use of Encryption Modes with Symmetric Block Ciphers

In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...

Read More

4 min read

An Overview of Symmetric Encryption and the Key Lifecycle

In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...

Read More