CRYPTOMATHIC BLOG

 

Key Management (5)

38526157131_3fa8f990df_k

6 min read

Cryptographic Key Management - the Risks and Mitigation

With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...

Read More
HSMs-in-Cryptography-Cryptomathic-1

5 min read

Turning Cryptography into a Service - Part 2

Part 2 – Accelerating Time-to-Market With the increase in e-commerce and electronic communications on the one hand and the growing challenges of...

Read More
Payment & Banking Cryptography: An Overview of the Benefits of z/OS and the Z Platform

4 min read

Payment & Banking Cryptography: The Benefits of z/OS & the Z Platform

This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for...

Read More
Spectre-Meltdown

2 min read

Meltdown & Spectre – What you Need to Know about Protecting your Keys

A number of serious security vulnerabilities, collectively known under the names of “Meltdown” and “Spectre” [1][2], have recently been discovered in...

Read More
Why a Key Management System Must Understand ANSI X9.24/TR-31 Key Blocks

3 min read

Why Key Management Systems Must Understand ANSI X9.24/TR-31 Key Blocks

The PCI Council requires most actors of payment networks to implement ANSI X9.24/TR-31-compliant key blocks to wrap and securely transmit, transfer,...

Read More
IBM's z15 Mainframe - Security, Resilience and Secure Key Management for Financial Service Platforms

4 min read

IBM z15 Mainframe & Secure Key Management for FS Platforms

Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...

Read More
crypto-abstraction-layer

3 min read

What is a Crypto-Abstraction Layer?

A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...

Read More
How to Improve HSM Usability ?

2 min read

How to Improve HSM Usability

In this article, we will explore some of the reasons why HSMs can be difficult to use and look at a novel solution that helps to overcome these...

Read More
Introduction to Cryptographic Key Blocks - FAQs

2 min read

Introduction to Cryptographic Key Blocks - FAQs

This article proposes answers to a series of frequently asked questions (FAQs) about key blocks.

Read More