Summary of cryptographic algorithms - according to NIST

The cryptographic protection of a system against attacks and malicious penetration depends on two dimensions: (1) The strength of the keys and the effectiveness of mechanisms and protocols associated with the keys; and (2) the protection of the keys through key management (secure key generation, storage, distribution, use and destruction).

Read more

Overview of NIST Key Management Recommendations on Key Types and Crypto-Periods

This article introduces and classifies cryptographic key types and crypto-periods as suggested by NIST, based on proven best practices for key management. It outlines the recommendations of when and how keys are used to protect data and explains how appropriate crypto-periods can be chosen and enforced.

Read more

Centralized Key Management Systems: Challenges and Opportunities for the Next Decade

Over the last 10 years, enterprises have moved on from decentralized and distributed key management to centralized key management systems to provide secure and unified key life-cycle management.

Read more

Cryptographic Key Management Concepts: on Key Generation, Metadata, Life-cycles, Compromise and more

This article looks at the concept of cryptographic key management – what it is, why it’s important, and how an electronic key management system simplifies the task of managing a high volume of keys.

Read more

Symmetric Cryptography and Key Management: Considerations on Key Exhaustion, Rotation and Security Models

With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of information has become increasingly important. The deployment of encryption is the backbone of any given organisation’s systems security scheme towards the goal of data protection.

Read more

The Role of Random Number Generators in Relation to HSMs & Key Management

In this article we look at the role of random number generators (RNGs) and put them into a procedural context with hardware security modules (HSMs) and key management systems (KMSs). 

Read more

The need to manage both symmetric and asymmetric keys

The use of both symmetric and asymmetric cryptography & keys are part of a well-rounded solution for securing digital transactions. Each approach to protecting data has its benefits, especially when applied to the appropriate scenarios. Here we look at the reasons for using each cryptographic method.

Read more

The Use of Encryption Modes with Symmetric Block Ciphers

In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers, including the need for padding and initialization vectors.

Read more

An Overview of Symmetric Encryption and the Key Lifecycle

In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two types of symmetric algorithm, and the lifecycle and management of symmetric keys.

Read more