4 min read
Symmetric Key Encryption - why, where and how it’s used in banking
In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
4 min read
In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...
6 min read
A system's cryptographic protection against attacks and malicious penetration is determined by two factors: (1) the strength of the keys and the...
3 min read
PCI PTS HSM compliance is mandated on banks, acquirers, processors and all other players involved in payment card systems. This article explores the...
4 min read
Cryptographic algorithms can be categorized into three classes: hash functions, symmetric, and asymmetric algorithms. This article sheds light on...
5 min read
This article introduces and classifies cryptographic key types and crypto-periods as suggested by NIST, based on proven best practices for key...
3 min read
Financial institutions and solution providers are busy implementing the requirements of Strong Customer Authentication (SCA) under the Revised...
6 min read
This article discusses the benefits eIDs provide for both banks and customers in streamlining cross-border transactions and what is required under...
2 min read
This article explains the concept of meta-data in the context of cryptographic keys, explaining why it is used and the necessity to manage it well.
4 min read
The concept of a token has been used in the digital world for almost 50 years to separate and protect real data elements from exposure. In recent...