CRYPTOMATHIC BLOG

 

Key Management (11)

Future-of-cryptography-cryptomathic-blue

5 min read

Trends in Cryptography Part 3 – HSMs and Cloud Computing

In this final part of the series, we look at how cloud computing will impact the use of cryptography and at the future of HSMs; and finally, we...

Read More
Future-of-cryptography-cryptomathic-red

5 min read

Trends in Cryptography Part 2 – Blockchain, IoT and Quantum Technology

As part 2 of this 3-part series, here we look at new applications such as blockchain and IoT, as well as the impact of quantum technology.

Read More
Future-of-cryptography-cryptomathic-green

4 min read

Trends in Cryptography Part 1 – Algorithms and Encryption

Cryptography has come a long way since ancient times, and the pace of development has been especially quick over the last 2 decades. Indeed, many...

Read More
3DES is Officially Being Retired

3 min read

3DES is Officially Being Retired

According to draft guidance published by NIST on July 19, 2018, the Triple Data Encryption Algorithm (TDEA) or 3DES is officially being retired. The...

Read More
Key-Management-HSM-compliance

2 min read

An Introduction to the Role of HSMs for PCI DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) helps to safeguard cardholders’ private information. The Payment Card Industry Security...

Read More
Private-life-of-keys

5 min read

The private life of private keys

A private cryptographic key is an extremely sensitive piece of information, and requires a whole set of special security measures to protect it. This...

Read More
PCI-DSS-Compliance-Validation

4 min read

PCI DSS Compliance Validation

Payment Card Industry Data Security Standard (PCI DSS) is an information security standard to prevent credit card fraud and protect against numerous...

Read More
Choosing-a-key-management-system-cryptomathic

4 min read

Buyer’s Guide to Choosing a Crypto Key Management System - Part 3

Part 3: Choosing the Right Key Management System In this concluding part, we will examine the business case for introducing a new key management...

Read More

4 min read

How to Choose the Right Cryptographic Key Generation Algorithm

Conversations about cryptography are common in the cyber-security world. One can find security professionals discussing everything from PKI to issues...

Read More