4 min read
An Overview of Symmetric Encryption and the Key Lifecycle
In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...
4 min read
In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...
5 min read
The ANSI X9.24-1: 2017 standard requires the use of secure cryptographic devices (SCDs) in the context of symmetric key cryptography and refers to...
2 min read
In June 2019, the PCI Security Standards Council issued an information supplement titled PCI PIN Security Requirement 18-3 – Key Blocks, which...
2 min read
The ANSI X9.24-1-2017 norm details how symmetric cryptographic keys should be managed and handled by the relevant actors of the retail financial...
3 min read
FIPS 140 (“Federal Information Processing Standard”) is a series of security standards published by the U.S. government that specify security...
4 min read
In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...
6 min read
A system's cryptographic protection against attacks and malicious penetration is determined by two factors: (1) the strength of the keys and the...
6 min read
With the rise of e-commerce, corporations and banks were able to more easily expand their businesses and services around the world.
4 min read
The standard, ANSI X9.24-1-2017 part 1 has been written to provide minimum symmetric key management requirements and guidelines for the retail...