2 min read
How to Convert Key Blocks
There are several types of key block formats used in different industries, especially the retail banking industry. The systems that use these key...
2 min read
There are several types of key block formats used in different industries, especially the retail banking industry. The systems that use these key...
3 min read
Java’s recent Elliptic Curve Digital Signature Algorithm (ECDSA) vulnerability underscores the fact that organizations cannot rely solely on outside...
2 min read
For traditional banks to rise above the competition they face from big tech, neobanks, and fintech, they need to add new digital skills to their...
5 min read
Here we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these...
4 min read
Encryption key management systems are now essential for all companies needing to lockdown data in the cloud, says Matt Landrock, CEO, Cryptomathic...
2 min read
One aspect of key management is dealing with what happens when a symmetric cryptographic key is no longer needed. The section ‘Key Replacement,...
2 min read
This article describes from a CISO perspective how to manage and protect security assets in large organisations, i.e. the cryptographic keys and...
3 min read
This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...
2 min read
The ANSI X9.24-1-2017 standard defines the requirements for the loading of key components or shares, and the loading of cleartext keys. The loading...