3 min read
What is a Crypto-Abstraction Layer?
A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...
3 min read
A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...
2 min read
In this article, we will explore some of the reasons why HSMs can be difficult to use and look at a novel solution that helps to overcome these...
1 min read
Cryptomathic has completed a successful integration of its centralized HSM and cryptography management platform, Crypto Service Gateway (CSG), with...
3 min read
This article discusses the misuse of X.509 certificates and keys in the SolarWinds attack and how Cryptomathic CKMS and CSG could help protect...
2 min read
Since the announcement of the SolarWinds supply chain attack, intensive analysis has been done by Crowdstrike, FireEye (with additional details),...
3 min read
The rise of quantum computing is expected to have significant impacts on both financial and technological considerations when evaluating...
4 min read
Tokenization is a generalized concept of a cryptographic hash. It means representing something by a symbol (‘token’).
3 min read
The first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is...
3 min read
This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.