CRYPTOMATHIC BLOG

 

CSG (3)

The SolarWinds attack and best practices for code-signing

2 min read

The SolarWinds attack and best practices for code-signing

Since the announcement of the SolarWinds supply chain attack, intensive analysis has been done by Crowdstrike, FireEye (with additional details),...

Read More
What is Quantum Computing and how does it relate to today’s Cryptography Infrastructure Investments

3 min read

Quantum Computing and Cryptography Infrastructure Investments

The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating...

Read More
Dancing-Men

4 min read

Tokenization in Banking and Financial Services

Tokenization is a generalized concept of a cryptographic hash. It means representing something by a symbol (‘token’).

Read More

3 min read

The SHA-1 Attack Further Emphasizes the Need for Crypto-Agility 

The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is...

Read More

3 min read

SHA-1 is Practical and Cost-Effective to Crack Now

This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.

Read More
technologies-behind-card-transaction-tokenization

5 min read

Technologies Behind Tokenization For Card Payments And PCI-DSS

The EMV consortium released several standards detailing how “network” tokenization should be handled. There is now a general consensus within the...

Read More
Tokenization-Info

6 min read

The Challenges and advantages of EMV Tokenization

EMV is short for EUROPAY-VISA-MASTERCARD. This term is used to refer to standards that have been designed to improve the security of credit and debit...

Read More
What is Banking-Grade Tokenization According to PCI DSS

4 min read

What is Banking-Grade Tokenization According to PCI DSS

The concept of a token has been used in the digital world for almost 50 years to separate and protect real data elements from exposure. In recent...

Read More
Crypto-agility-cryptomathic-Racing

3 min read

What is Crypto-Agility?

Crypto-agility, or cryptographic agility, is the capacity for an information security system to adopt an alternative to the original encryption...

Read More