6 min read
Key Management and use cases for HSMs
With the rise of e-commerce, corporations and banks were able to more easily expand their businesses and services around the world.
 
                  
                
                6 min read
 Chris Allen:  17. December 2019
                    
                    Chris Allen:  17. December 2019
                  With the rise of e-commerce, corporations and banks were able to more easily expand their businesses and services around the world.
 
                  
                
                3 min read
PCI PTS HSM compliance is mandated on banks, acquirers, processors and all other players involved in payment card systems. This article explores the...
 
                  
                
                4 min read
 Martin Rupp (guest):  04. December 2019
                    
                    Martin Rupp (guest):  04. December 2019
                  The standard, ANSI X9.24-1-2017 part 1 has been written to provide minimum symmetric key management requirements and guidelines for the retail...
 
                  
                
                2 min read
 Martin Rupp (guest):  26. November 2019
                    
                    Martin Rupp (guest):  26. November 2019
                  ANSI X9.24-1-2017 part 1 is a standard that deals with symmetric key management techniques for retail financial services.
 
                  
                
                4 min read
Cryptographic algorithms can be categorized into three classes: hash functions, symmetric, and asymmetric algorithms. This article sheds light on...
 
                  
                
                5 min read
This article introduces and classifies cryptographic key types and crypto-periods as suggested by NIST, based on proven best practices for key...
 
                  
                
                3 min read
 Martin Rupp (guest):  03. October 2019
                    
                    Martin Rupp (guest):  03. October 2019
                  In this article, we will review some of the constraints of an EMV tokenization solution when it comes to FIPS and more generally, NIST considerations.
 
                  
                
                3 min read
Financial institutions and solution providers are busy implementing the requirements of Strong Customer Authentication (SCA) under the Revised...
 
                  
                
                6 min read
This article discusses the benefits eIDs provide for both banks and customers in streamlining cross-border transactions and what is required under...