Skip to the main content.

CRYPTOMATHIC BLOG

 

Key Management (9)

4 min read

Random Number Generators and Their Role in Cryptography

In this article, we examine the use of random number generators (RNGs) in cryptography, specifically in relation to hardware security modules (HSMs)...

Read More

7 min read

Exploring the Lifecycle of a Cryptographic Key

This article discusses the main phases involved in the lifecycle of a cryptographic key, and how the operational lifetime of a key and its strength...

Read More

2 min read

Centralized vs. Distributed Key Management Explained

The need for mitigating risk with an appropriate key management system (KMS) is critical to the success of any organization that shares sensitive...

Read More
Key-management-explained

4 min read

Benefits of an Automated Centralized Key Management System

The aim of this article is inform you on how to implement proper key management and to answer 3 important questions regarding centralized and...

Read More

2 min read

Exploring Hardware Security Modules (HSMs)

I once consulted a bank about their painstakingly slow cryptography and security processing system. After a week of searching, I examined the...

Read More

3 min read

Trends in Cryptography Part 1 – Algorithms and Encryption

Cryptography has come a long way since ancient times, and the pace of development has been especially quick over the last 2 decades. Indeed, many...

Read More
3DES is Officially Being Retired

3 min read

3DES Encryption Standard Is Officially Retired

According to draft guidance published by NIST on July 19, 2018, the Triple Data Encryption Algorithm (TDEA) or 3DES is officially being retired. The...

Read More
Key-Management-HSM-compliance

2 min read

HSMs: Essential Tools for PCI DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) helps to safeguard cardholders’ private information. The Payment Card Industry Security...

Read More
Private-life-of-keys

5 min read

Exploring the Private Life of Private Keys

A private cryptographic key is an extremely sensitive piece of information, and requires a whole set of special security measures to protect it. This...

Read More