CRYPTOMATHIC BLOG

 

Key Management (8)

your-own.key-Cryptomathic-infosec-key-management

2 min read

Key Management – A Question of Ownership

This article looks at the problems associated with key management that are common in many businesses today, where there is no clear ownership; then...

Read More
ANSI X9.24-1-2017:  Key Compromise

2 min read

ANSI X9.24-1-2017:  Key Compromise

In a retail financial services environment, the compromise of a symmetric cryptographic key is a critical security breach. Such a situation is...

Read More

3 min read

Retail Banking - A Stacked Platform Future with Next Generation Security

Consumer behavior have shown a dramatic shift toward a preference for seamless digital banking solutions. Many banking customers now want simple and...

Read More

3 min read

BYOK: a Solution for EBA’s New ICT and Security Risk Management Guidelines

The European Banking Authority's (EBA’s) new ICT and Security Risk Management Guidelines provide guidance for cybersecurity requirements for...

Read More
The Postbank Master Key Breach in South Africa

3 min read

Postbank Master Key Breach: Why Strong Key Management is Essential

In the last couple of months, facts regarding breaches that occurred during December 2018 at PostBank, the national postal bank operator of South...

Read More

3 min read

Why a Banking Key Management System Must Support Atalla Key Blocks

Invented by Mohamed Atalla, the Atalla key block is the root of all key blocks. All over the globe, hundreds of millions of financial transactions...

Read More
Securing the Lifecycle of a Cryptographic Key

8 min read

Securing the Life-cycle of a Cryptographic Key

This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...

Read More
symmetric-key-management-and-key-rotation

6 min read

Symmetric Cryptography & Key Management: Exhaustion, Rotation, Defence

With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of...

Read More
The need to manage both symmetric and asymmetric keys

3 min read

The need to manage both symmetric and asymmetric keys

A well-rounded solution for securing digital transactions includes the use of both symmetric and asymmetric cryptography and keys. Each method of...

Read More