CRYPTOMATHIC BLOG

 

Key Management (6)

Bring Your Own Key (BYOK) to the Google Cloud Brings New Opportunities to Financial Institutions

5 min read

BYOK for Google Cloud: Financial Institution Benefits

This article discusses the concerns surrounding key management for cloud environments and how Cryptomathic addresses them by bringing banking-grade...

Read More

2 min read

BYOK: A Solution for EBA’s ICT and Security Risk Management Guidelines

The European Banking Authority's (EBA’s) new ICT and Security Risk Management Guidelines provide guidance for cybersecurity requirements for...

Read More

3 min read

Postbank Master Key Breach: Strong Key Management Importance

In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...

Read More

3 min read

Why a Banking KMS Must Support Atalla Key Blocks

Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...

Read More

8 min read

How to Secure the Lifecycle of Cryptographic Keys

This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...

Read More

6 min read

Symmetric Cryptography & Key Management: Exhaustion & Rotation

With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of...

Read More

2 min read

The need to manage both symmetric and asymmetric keys

A well-rounded solution for securing digital transactions includes the use of both symmetric and asymmetric cryptography and keys. Each method of...

Read More

3 min read

ANSI X9.24-1-2017: Key Distribution 

Key distribution is perhaps the most important and crucial aspect of the ANSI X9.24-1-2017 part 1 standard. But first, let us explain what...

Read More

3 min read

Understanding Encryption Modes with Symmetric Ciphers

In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...

Read More