CRYPTOMATHIC BLOG

 

3 min read

Key Management Strategies for SaaS: Avoid the pitfalls in the Cloud

This article discusses key management strategies for the SaaS cloud model, and unique security problems to be dealt with because of lack of user...

Read More

4 min read

Key Management Systems: Top Capabilities & Functions

Typical Services Provided by Key Management Systems Key management is the administration of tasks involved in all aspects of cryptographic key usage...

Read More

6 min read

Understanding the Trusted Platform Module (TPM)

Introducing the TPM The Trusted Platform Module (TPM) is a special purpose microcontroller designed by the Trusted Computing Group, which interfaces...

Read More

4 min read

GlobalPlatform Key Management System

This article provides an overview of GlobalPlatform (GP) Key Management and includes a proposed architecture for an efficient GP Key Management...

Read More
Authenticated_encryption.jpg

3 min read

Authenticated Encryption: Enhancing Data Security

A New Cryptographic Primitive? By far the oldest and perhaps also the best-known goal of cryptographic methods is the protection of secrecy, or...

Read More

4 min read

TSM Solutions: 3rd Party SIM Card Management

Trusted Service Manager (TSM) is a relatively new role required in a mobile Near Field Communication (NFC) ecosystem. The core services a Trusted...

Read More