CRYPTOMATHIC BLOG

 

Key Management (9)

ANSI X9.24-1-2017: Key Distribution 

3 min read

ANSI X9.24-1-2017: Key Distribution 

Key distribution is perhaps the most important and crucial aspect of the ANSI X9.24-1-2017 part 1 standard. But first, let us explain what...

Read More
The Use of Encryption Modes with Symmetric Block Ciphers

3 min read

The Use of Encryption Modes with Symmetric Block Ciphers

In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...

Read More
An Overview of Symmetric Encryption and the Key Lifecycle

4 min read

An Overview of Symmetric Encryption and the Key Lifecycle

In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...

Read More

5 min read

Exploring Secure Cryptographic Devices for Retail Financial Services

The ANSI X9.24-1: 2017 standard requires the use of secure cryptographic devices (SCDs) in the context of symmetric key cryptography and refers to...

Read More
key blocks

2 min read

PCI Key Block Implementation: Migration Phases & Key Management

In June 2019, the PCI Security Standards Council issued an information supplement titled PCI PIN Security Requirement 18-3 – Key Blocks, which...

Read More

2 min read

ANSI X9.24-1-2017: The General Key Management Requirements

The ANSI X9.24-1-2017 norm details how symmetric cryptographic keys should be managed and handled by the relevant actors of the retail financial...

Read More
FIPS-security-cryptomathic

3 min read

Understanding The New FIPS 140-3

FIPS 140 (“Federal Information Processing Standard”) is a series of security standards published by the U.S. government that specify security...

Read More
Symmetric Key Encryption - why, where and how it’s used in banking

5 min read

Symmetric Key Encryption - why, where and how it’s used in banking

In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...

Read More
Summary of cryptographic algorithms - according to NIST

6 min read

Summary of cryptographic algorithms - according to NIST

A system's cryptographic protection against attacks and malicious penetration is determined by two factors: (1) the strength of the keys and the...

Read More