Peter Smirnoff (guest)

Peter Smirnoff (guest)

Peter is an internationally active cryptography scientist. Peter has a long experience in Cryptography, both in industry and research. Peter has worked on the Windows Crypto API, OpenSSL, digital signatures, X 509 Certificates etc. He has profound implementation experience with PKCS-11 smart-cards as well on Linux and Windows platforms.
Symmetric Cryptography in Financial Institutions: Key Management Challenges

Symmetric Cryptography in Financial Institutions: Key Management Challenges

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten advantages as opposed to asymmetric cryptography.

Harmonizing digitally signed data between Russia and the EU - a Russian Perspective

Harmonizing digitally signed data between Russia and the EU - a Russian Perspective

This article discusses why cryptographically protected data exchange between the EU and Russia (and other countries) is still difficult to implement.

Understanding Hardware Security Modules (HSMs)

Understanding Hardware Security Modules (HSMs)

I once consulted a bank about their painstakingly slow cryptography and security processing system. After a week of searching, I examined the cryptographic subsystem, which used Windows Crypto API and a certified CSP.

The private life of private keys

The private life of private keys

A private cryptographic key is an extremely sensitive piece of information, and requires a whole set of special security measures to protect it. This article outlines some problems with key management relating to the life cycle of private cryptographic keys. There are many types of cryptographic keys; each type has own inherent challenges. Here, we outline some of the challenges we meet when managing the life cycle of asymmetric cryptographic keys and pairs.

Cryptographic Operations - Best Practices To Make Your System Secure

Cryptographic Operations - Best Practices To Make Your System Secure

This article outlines cryptographic operations and best practices you should follow to make your applications or systems secure.

Manual vs. Automated Key Management

Manual vs. Automated Key Management

This article evaluates and compares manual and automated cryptographic key management. It looks at security-related issues as well as organizational and economic aspects.