CRYPTOMATHIC BLOG

 

3 min read

Why a Banking Key Management System Must Support Atalla Key Blocks

Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...

Read More
Secure Hardening for Mobile Banking Apps: Native Code Obfuscation

3 min read

Secure Hardening for Mobile Banking Apps: Native Code Obfuscation

In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...

Read More

5 min read

W3C's suggestion for a Web Cryptography API

The World Wide Web Consortium or W3C as it is commonly known was founded in 1994 by the original architect of the World Wide Web, Tim Berners-Lee. It...

Read More
Securing the Lifecycle of a Cryptographic Key

8 min read

Securing the Life-cycle of a Cryptographic Key

This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...

Read More
symmetric-key-management-and-key-rotation

6 min read

Symmetric Cryptography & Key Management: Exhaustion, Rotation, Defence

With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of...

Read More

3 min read

Secure Hardening for Mobile Banking and Payment Apps: Anti-Debug

In the mobile environment, while debuggers are legal and legitimate development tools, they can also be used to reverse mobile banking and payment...

Read More

5 min read

How Crypto-agility Prepares You For Risks

While the science and technology behind quantum computers is extremely complex, their computing power has been steadily increasing, from 3 qubits in...

Read More

2 min read

Addressing HTTPS Vulnerabilities in Mobile Banking and Payment Apps

Here we describe some of the HTTPS vulnerabilities in the context of mobile banking and their countermeasures.

Read More
The need to manage both symmetric and asymmetric keys

3 min read

The need to manage both symmetric and asymmetric keys

A well-rounded solution for securing digital transactions includes the use of both symmetric and asymmetric cryptography and keys. Each method of...

Read More