Payment & Banking Cryptography: An Overview of the Benefits of z/OS and the Z Platform

This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for cross-vendor encryption and key management.

Read more

TR-34 Key Blocks for the TR-34 Exchange Protocol: Basic Principles

Among all the various key block formats, the TR-34 format is undoubtedly one of the most sophisticated formats.

The TR-34 norm is an implementation of the X9.24-2 norm. It proposes a realistic and efficient way of exchanging symmetric keys using asymmetric cryptography. This is basically a certificate-based Remote Key Loading (RKL) protocol. 

Read more

Introduction to Cryptographic Key Blocks - FAQs

This article proposes answers to a series of frequently asked questions (FAQs) about key blocks.

Read more

ANSI X9.24-1-2017: Key Replacement, Destruction, and Archiving

One aspect of key management is dealing with what happens when a symmetric cryptographic key is no longer needed. The section ‘Key Replacement, Destruction and Archiving’ within ANSI X9.24-1-2017 explains what needs to happen.

Read more

Customer Demand Helps to Co-Shape Banking Security and Cryptography Architecture

Client behaviors and expectations are behind the transformation that is currently reshaping the new banking security architecture. While clients want more digital banking and financial services, they still look to a bank’s physical presence as one that is symbolic for building trust, credibility, and the reputation of the institution.

Read more

Cryptomathic CKMS: Centralized & Automated Key Management for payShield HSMs

Banks and financial institutions must adhere to a rigorous set of security and regulatory practices to protect data, communications, and processes.

Read more

Selecting the Right Key Management System

The protection and secure management of cryptographic keys is crucial for ensuring that cryptography is used in the most effective way to keep data secure. Picking the wrong key management system (KMS) can thwart all the efforts that have been made in using cryptography to protect information.

Read more

BYOK for MS Azure KEY Vault - Helping Banks Take Control of Their Keys for MS Azure, Dynamics, and Office 365

This article explores how Cryptomathic CKMS combines BYOK for the MS Azure Key Vault with banking-grade key lifecycle management; to address the concerns banks have regarding key management in the public cloud.

Read more

Air India's Massive Data Breach - following best practices for data security is more important than ever

Recent events throughout the world have evidenced that high-profile hackers and state-sponsored attempts at security breaches have been steadily increasing since 2020. It is becoming rapidly apparent that no sector is immune to becoming a victim of a data breach, including the airline industry, where the safety of crew and passengers is put at grave risk.

Read more