5 min read
Quantum Computing: The Future of Cryptography
“Quantum computing” is computation performed using a computing device based on the strange, counter-intuitive physical properties of matter at very...
 
                  
                
                5 min read
“Quantum computing” is computation performed using a computing device based on the strange, counter-intuitive physical properties of matter at very...
 
                  
                
                4 min read
In this article, we examine the use of random number generators (RNGs) in cryptography, specifically in relation to hardware security modules (HSMs)...
 
                  
                
                7 min read
 Chris Allen:  19. March 2019
                    
                    Chris Allen:  19. March 2019
                  This article discusses the main phases involved in the lifecycle of a cryptographic key, and how the operational lifetime of a key and its strength...
 
                  
                
                2 min read
The need for mitigating risk with an appropriate key management system (KMS) is critical to the success of any organization that shares sensitive...
 
                  
                
                3 min read
For identifying, detecting, and eliminating flaws in a key management system, independent third-party testing is required (KMS). Third-party testing...
 
                  
                
                3 min read
What You See Is What You Sign (WYSIWYS) refers to the part of any signature process, where you read a document you intend to sign, and ensure that...
 
                  
                
                4 min read
The aim of this article is inform you on how to implement proper key management and to answer 3 important questions regarding centralized and...
 
                  
                
                2 min read
I once consulted a bank about their painstakingly slow cryptography and security processing system. After a week of searching, I examined the...
 
                  
                
                3 min read
Cryptography has come a long way since ancient times, and the pace of development has been especially quick over the last 2 decades. Indeed, many...