CRYPTOMATHIC BLOG

 

Key Management (13)

Manual vs. Automated Key Management

4 min read

Manual vs. Automated Key Management

This article evaluates and compares manual and automated cryptographic key management. It looks at security-related issues as well as organizational...

Read More

4 min read

EMV and PCI DSS compliance: cryptography and key management requirements

EMV chips on payment cards contain cryptographic co-processors and dual interfaces that allow for contact and contactless payment options. When...

Read More

2 min read

A summary of the revised NIST standards for Key Management

Cryptography is the foundation of protecting electronic data and cyber security. Encryption can effectively prevent breaches while also protecting...

Read More

2 min read

Expert’s Guidelines on how to document a Key Management System

This article discusses the importance and usage of documentation for a key management system within an organization.

Read More

4 min read

Cryptographic Key Management Policy: a layered approach

This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy...

Read More
Sercuring_web_applications_with_cryptographic_zones.jpg

2 min read

Securing Web applications with Cryptographic Zones

A cryptographic zone exists between two points, where a symmetric key or asymmetric public keys are shared in order to encrypt sensitive information....

Read More
Reducing_Payment_Credit_Card_Fraud_By_Shifting_to_EMV_technology.jpg

10 min read

Reducing Payment Card Fraud by Shifting over to EMV Chip Technology

This article gives an insight into the EMV chip technology, which is being rolled out on a world-wide scale to increase the level of fraud protection...

Read More
Assignment_and_configuration_of_roles_in_a_cyrpto_key_management_system.jpg

2 min read

Assignment and Configuration of Roles in a Crypto Key Management System

This article introduces and describes the relevant roles needed to successfully manage a key management system in an organisation.

Read More
How_to_define_appropriate_crypto_periods_for_cryptographic_keys.jpg

3 min read

How to define appropriate Crypto-periods for Cryptographic keys

The period of time between the key activation and key deactivation is called the crypto period of the key. The crypto period is defined by factors...

Read More