CRYPTOMATHIC BLOG

 

3DES

Classification-cryptpgrapjic-keys

5 min read

Classification of Cryptographic Keys

This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...

Read More
38526157131_3fa8f990df_k

7 min read

Cryptographic Key Management - the Risks and Mitigation

With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...

Read More
crypto-abstraction-layer

3 min read

What is a Crypto-Abstraction Layer?

A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...

Read More
Symmetric Encryption Algorithms - Their Strengths and Weaknesses, and the Need for Crypto-Agility

5 min read

Symmetric Encryption Algorithms And The Need For Crypto-Agility

In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...

Read More
Quantum-Cryptography

5 min read

Quantum Computing and its Impact on Cryptography

“Quantum computing” is computation performed using a computing device based on the strange, counter-intuitive physical properties of matter at very...

Read More
Crypto-agility-cryptomathic-Racing

3 min read

What is Crypto-Agility?

Crypto-agility, or cryptographic agility, is the capacity for an information security system to adopt an alternative to the original encryption...

Read More
3DES is Officially Being Retired

3 min read

3DES is Officially Being Retired

According to draft guidance published by NIST on July 19, 2018, the Triple Data Encryption Algorithm (TDEA) or 3DES is officially being retired. The...

Read More

7 min read

PKI for EMV cards compliant to PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard to prevent credit card scams and numerous additional...

Read More