CRYPTOMATHIC BLOG

 

Key Management (4)

Converting Key Blocks from one to another One Format to Another: How It’s Done and in Which Sectors

2 min read

How to Convert Key Blocks

There are several types of key block formats used in different industries, especially the retail banking industry. The systems that use these key...

Read More
Good key management for financial services: protecting your digital assets from the inside out

3 min read

Key Management in FS: Protecting Your Digital Assets, Inside and Out

Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside...

Read More

2 min read

4 Reasons How Banks Should Use Cryptography To Become Digitally Agile

For traditional banks to rise above the competition they face from big tech, neobanks, and fintech, they need to add new digital skills to their...

Read More
Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

5 min read

Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

Here we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these...

Read More

4 min read

Cloud encryption: Bring Your Own Key is no longer enough

Encryption key management systems are now essential for all companies needing to lockdown data in the cloud, says Matt Landrock, CEO, Cryptomathic...

Read More
ANSI X9.24-1-2017: Key Replacement, Destruction, and Archiving

2 min read

ANSI X9.24-1-2017: Key Replacement, Destruction, and Archiving

One aspect of key management is dealing with what happens when a symmetric cryptographic key is no longer needed. The section ‘Key Replacement,...

Read More

2 min read

Regain Control of Cryptographic Keys with Centralized Key Management

This article describes from a CISO perspective how to manage and protect security assets in large organisations, i.e. the cryptographic keys and...

Read More
Summary of the Practical Key Management Challenges Behind Symmetric Cryptography in Financial Institutions 

3 min read

Symmetric Cryptography in Financial Institutions: Key Management Challenges

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...

Read More
ANSI X9.24-1-2017: Key Loading

2 min read

ANSI X9.24-1-2017: Key Loading

The ANSI X9.24-1-2017 standard defines the requirements for the loading of key components or shares, and the loading of cleartext keys. The loading...

Read More