CRYPTOMATHIC BLOG

 

Symmetric Encryption

3 min read

Key Management Challenges in Financial Symmetric Cryptography Systems

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...

Read More

3 min read

Symmetric Key Creation & Keyshare Generators Explained

In this article, we look at the process of a keyshare generator and key derivation as described by the ANSI X9.24-1-2017 standard. This process is...

Read More

6 min read

Symmetric Cryptography & Key Management: Exhaustion & Rotation

With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of...

Read More

5 min read

Symmetric Encryption Algorithms And The Need For Crypto-Agility

In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...

Read More

3 min read

Understanding Encryption Modes with Symmetric Ciphers

In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...

Read More

4 min read

An Overview of Symmetric Encryption and the Key Lifecycle

In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...

Read More

2 min read

ANSI X9.24-1-2017: General Key Management Requirements

The ANSI X9.24-1-2017 norm details how symmetric cryptographic keys should be managed and handled by the relevant actors of the retail financial...

Read More

4 min read

Symmetric Key Encryption - why, where and how it’s used in banking

In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...

Read More

6 min read

A NIST-Based Summary of Cryptographic Algorithms

A system's cryptographic protection against attacks and malicious penetration is determined by two factors: (1) the strength of the keys and the...

Read More