CRYPTOMATHIC BLOG

 

Key Management (10)

Key Management and use cases for HSMs

6 min read

Key Management and use cases for HSMs

With the rise of e-commerce, corporations and banks were able to more easily expand their businesses and services around the world.

Read More
ANSI-payment-environment-cryptography

4 min read

Understanding the Card Payment Environment and Symmetric Key Use

The standard, ANSI X9.24-1-2017 part 1 has been written to provide minimum symmetric key management requirements and guidelines for the retail...

Read More
An-Introduction-into-ANSI-X9-24-1-2017

2 min read

An Introduction into ANSI X9.24-1-2017 part 1

ANSI X9.24-1-2017 part 1 is a standard that deals with symmetric key management techniques for retail financial services.

Read More
Differences between Hash functions, Symmetric & Asymmetric Algorithms

4 min read

Differences between Hash functions, Symmetric & Asymmetric Algorithms

Cryptographic algorithms can be categorized into three classes: hash functions, symmetric, and asymmetric algorithms. This article sheds light on...

Read More
Key-length

5 min read

Key Types and Crypto-Periods: NIST Key Management Recommendations

This article introduces and classifies cryptographic key types and crypto-periods as suggested by NIST, based on proven best practices for key...

Read More
Strong_Cryptography_requirements_for_EMV_cards_compliant_to_PCI_DSS

3 min read

An Introduction to PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a security standard for information that protects against credit card fraud and many...

Read More
key-management-dare-to-ask-cryptomathic

5 min read

Understanding Cryptographic Key Management Concepts

This article looks at the concept of cryptographic key management – what it is, why it’s important, and how an electronic key management system...

Read More
Random-Number-Generation-in-Cryptography

4 min read

The Use of Random Number Generators in Cryptography

In this article, we examine the use of random number generators (RNGs) in cryptography, specifically in relation to hardware security modules (HSMs)...

Read More
Exploring the Lifecycle of a Cryptographic Key

7 min read

Exploring the Lifecycle of a Cryptographic Key

This article discusses the main phases involved in the lifecycle of a cryptographic key, and how the operational lifetime of a key and its strength...

Read More