CRYPTOMATHIC BLOG

 

Key Management (6)

crypto-abstraction-layer

3 min read

What is a Crypto-Abstraction Layer?

A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...

Read More
How to Improve HSM Usability ?

2 min read

How to Improve HSM Usability

In this article, we will explore some of the reasons why HSMs can be difficult to use and look at a novel solution that helps to overcome these...

Read More
Introduction to Cryptographic Key Blocks - FAQs

2 min read

Introduction to Cryptographic Key Blocks - FAQs

This article proposes answers to a series of frequently asked questions (FAQs) about key blocks.

Read More
ANSI X9.24-1-2017: Key Utilization and Storage

3 min read

ANSI X9.24-1-2017: Key Utilization and Storage

This article briefly summarizes the symmetric cryptographic key utilization and storage requirements as described by the ANSI X9.24-1-2017 (part 1)...

Read More
Thales Key Blocks

3 min read

How to use Thales Key Blocks in payShield HSMs

Thales Key Blocks are an essential cryptographic key wrapping format. In comparison to other key block formats, they are proprietary and only work...

Read More
Cryptomathic CKMS: Centralized & Automated Key Management for payShield HSMs

2 min read

Cryptomathic CKMS: Centralized, Automated Key Management for payShield

Banks and financial institutions must adhere to a rigorous set of security and regulatory practices to protect data, communications, and processes.

Read More
Choosing the right key-management-system across the hybrid cloud

3 min read

Selecting the Right Key Management System

The protection and secure management of cryptographic keys is crucial for ensuring that cryptography is used in the most effective way to keep data...

Read More
BYOK for MS Azure KEY Vault - Helping Banks Take Control of Their Keys for MS Azure, Dynamics, and Office 365

4 min read

Take Control of Your Keys: BYOK for the MS Azure Key Vault

This article explores how Cryptomathic CKMS combines BYOK for the MS Azure Key Vault with banking-grade key lifecycle management; to address the...

Read More
Air India's Massive Data Breach - Compliance to Major Rules of Data Security of More Important than Ever

4 min read

Air India's Data Breach - data security is more crucial than ever.

Recent global events have demonstrated that high-profile hackers and state-sponsored security breaches have been steadily increasing since 2020. It...

Read More