Enabling HSM Cryptography as an Integrated Service - Part 3 of 3

An updated version of this article is available under this link.

To date the deployment of encryption services and the techniques used to achieve interoperability and technical standards have always lagged behind what businesses have actually needed, or for that matter, what regulators or certain schemes are enforcing.

Read more

Enabling HSM Cryptography as an Integrated Service - Part 2 of 3

An updated version of this article is available under this link.

Development Projects Situations     

This second decade since the Millennium is seeing a major uplift in the use of cryptography in existing and new business systems. This uplift is likely to be disproportionately greater than the actual increase in business transaction volumes.

Read more

Enabling HSM Cryptography as an Integrated Service - Part 1 of 3

An updated version of this article is available under this link.

Managing Hardware Cryptography in the Enterprise since the Millennium

There has been a substantial increase in the use of cryptographic techniques and Hardware Security Modules (HSM's) in larger commercial enterprises, and banks in particular, since the upsurge of online services in the late 1990's. Invariably this has been undertaken on a project basis, with each project having its own goals and initial budget.

Read more

GlobalPlatform Key Management System

This article provides an overview of GlobalPlatform (GP) Key Management and includes a proposed architecture for an efficient GP Key Management System (KMS) based on the Cryptomathic - Crypto Key Management System (CKMS). This article is not intended to cover all possible uses of GlobalPlatform, but is meant to provide an overview of how it may well be used in an environment where the chip is personalized centrally, after

Read more