3 min read
Access Token Protection for Secure Mobile Connectivity
In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...
3 min read
In this article, we introduce the role that access tokens play in mobile banking applications and provide recommendations on how to secure these...
3 min read
In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...
2 min read
Application hardening usually consists in processing an already developed application, and transforming it so to make it difficult / impossible to...
4 min read
In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...
3 min read
The security of the storage of cryptographic secrets is essential to ensuring the security of the whole chain of the cryptographic protocol, where...
5 min read
The ANSI X9.24-1: 2017 standard requires the use of secure cryptographic devices (SCDs) in the context of symmetric key cryptography and refers to...
2 min read
Mobile banking and payment app security is deeply linked to their ability to prevent attackers from tampering with them.
2 min read
Key Blocks have been invented as a standard way for protecting the integrity of symmetric cryptographic keys and for identifying what the keys can be...
2 min read
In June 2019, the PCI Security Standards Council issued an information supplement titled PCI PIN Security Requirement 18-3 – Key Blocks, which...