3 min read
Understanding Symmetric Key Creation, Components & Keyshare Generators
In this article, we look at the process of a keyshare generator and key derivation as described by the ANSI X9.24-1-2017 standard. This process is...
3 min read
In this article, we look at the process of a keyshare generator and key derivation as described by the ANSI X9.24-1-2017 standard. This process is...
3 min read
Unlike other operating systems like Windows, Linux, or OSX, both Android and iOS operating systems are usually shipped with built-in user rights...
2 min read
In a retail financial services environment, the compromise of a symmetric cryptographic key is a critical security breach. Such a situation is...
3 min read
In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...
4 min read
Tokenization is a generalized concept of a cryptographic hash. It means representing something by a symbol (‘token’).
3 min read
Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...
3 min read
In the mobile environment, source code is often distributed without enough security. Programs compiled as bytecode, such as the ones developed for...
3 min read
In the mobile environment, while debuggers are legal and legitimate development tools, they can also be used to reverse mobile banking and payment...
2 min read
Here we describe some of the HTTPS vulnerabilities in the context of mobile banking and their countermeasures.