5 min read
BYOK, CYOK, HYOK: Cloud Key Management Explained
Here we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these...
5 min read
Here we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these...
2 min read
One aspect of key management is dealing with what happens when a symmetric cryptographic key is no longer needed. The section ‘Key Replacement,...
3 min read
This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...
2 min read
The ANSI X9.24-1-2017 standard defines the requirements for the loading of key components or shares, and the loading of cleartext keys. The loading...
6 min read
With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...
3 min read
This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for...
2 min read
A number of serious security vulnerabilities, collectively known under the names of “Meltdown” and “Spectre” [1][2], have recently been discovered in...
3 min read
The PCI Council requires most actors of payment networks to implement ANSI X9.24/TR-31-compliant key blocks to wrap and securely transmit, transfer,...
3 min read
Banks continue to feel the profound transformational effects that digital technologies have on their business. This can be seen in the creation and...