3 min read
Trends in Cryptography Part 1 – Algorithms and Encryption
Cryptography has come a long way since ancient times, and the pace of development has been especially quick over the last 2 decades. Indeed, many...
3 min read
Cryptography has come a long way since ancient times, and the pace of development has been especially quick over the last 2 decades. Indeed, many...
3 min read
According to draft guidance published by NIST on July 19, 2018, the Triple Data Encryption Algorithm (TDEA) or 3DES is officially being retired. The...
2 min read
The Payment Card Industry Data Security Standard (PCI DSS) helps to safeguard cardholders’ private information. The Payment Card Industry Security...
5 min read
A private cryptographic key is an extremely sensitive piece of information, and requires a whole set of special security measures to protect it. This...
4 min read
Payment Card Industry Data Security Standard (PCI DSS) is an information security standard to prevent credit card fraud and protect against numerous...
4 min read
Conversations about cryptography are common in the cyber-security world. One can find security professionals discussing everything from PKI to issues...
3 min read
Key management refers to managing cryptographic keys within a cryptosystem. It is concerned with the generation, exchange, storage, use, and...
3 min read
Appropriate management of cryptographic keys is essential for the application of cryptography. This is often aided by the use of a hardware security...
3 min read
Part 1 – Increasing Efficiency & Resilience This two-part article discusses how cryptography is employed within organizations today and examines some...