CRYPTOMATHIC BLOG

 

CSG (2)

3 min read

How to Deploy and Manage Cryptography in a Project the Right Way

With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...

Read More

3 min read

NIST Releases Quantum-Resistant Cryptography Standards. Act Now!

An over five-year-long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of...

Read More
NIST PQC Finalists Update: It’s Over For The Rainbow

4 min read

NIST PQC Finalists Update: It’s Over For The Rainbow

Last month, one of the three NIST finalists for post-quantum signature schemes received its final nail in the coffin: Ward Beullens, a PostDoc at IBM...

Read More
Code-signing-cryptomathic

3 min read

Achieving Software Integrity Through Centralized Code Signing

The phrase “…Software is eating the world.” was famously used by Marc Andreessen in a WSJ article in 2011. No one could argue that software has...

Read More
Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

3 min read

Examining the NIST's Post-Quantum Cryptography Standardization Process

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...

Read More
HSMs-in-Cryptography-Cryptomathic-1

5 min read

Turning Cryptography into a Service - Part 2

Part 2 – Accelerating Time-to-Market With the increase in e-commerce and electronic communications on the one hand and the growing challenges of...

Read More
Using_a_centralized_key_management_system_to_enforce_information_security_policies.jpg

2 min read

How to Use a Centralized KMS to Enforce Information Security Policies

A Key Management System (KMS) must be designed in a manner that supports the goals of each organization using the KMS. The aim of a security policy...

Read More
Differentiating between managing the lifecycle of cryptographic keys, protecting the keys and using the keys

3 min read

Differentiating Between Cryptographic Key Management, Protection & Use

The modern world of cybersecurity can be a confusing place. There are tons of data, regulations, and mandates in addition to the complex technical...

Read More
Tokenization-will-reduce-false-declines

4 min read

How Tokenization May Reduce False Declines

This article discusses how tokenization may reduce false declines with credit card transactions that could negatively impact merchants.

Read More