Whitfield Diffie: the well-deserved laureate of the 2015 Turing Award

Whitfield Diffie: the well-deserved laureate of the 2015 Turing Award


On June 11, 2016, Whitfield Diffie, a Technical Advisory Board member at Cryptomathic, and Martin E. Hellman, Professor Emeritus of Electrical Engineering at Stanford University, will be awarded the 2015 ACM A.M. Turing Award for their important contributions to modern cryptography. This was officially announced by the ACM, the Association for Computing Machinery, in honor of Alan M. Turing, the British mathematician whose contributions to cryptography helped during World War II with the Allied crypto-analysis of the German Enigma cipher. Google, Inc. funds this prize of $1 million for its recipients. The prestigious Turing Award is referred to as the “Nobel Prize of Computing.”

Basic Encryption Failure Defect #1: Obscurity

Basic Encryption Failure Defect #1: Obscurity

“Impossible!” the man exclaimed, “I designed that encryption myself!  No one can break it as fast as you claim!” I am John Tränkenschuh, a CISSP-ISSAP with 24 years experience in Information Security. 

Methods of Maximizing the Security Protection of a Cryptographic System relating to the Payment Card Industry (PCI)

Methods of Maximizing the Security Protection of a Cryptographic System relating to the Payment Card Industry (PCI)

This article talks about how different factors and controls can affect the strength and effectiveness of a cryptographic system's security. It gives particular consideration to the requirements of the Payment Card Industry (PCI).

Enhancing Payment Card Security Integrating PCI DSS with EMV Technology

Enhancing Payment Card Security Integrating PCI DSS with EMV Technology

This article discusses how the security protection of payment card data used in a transaction can be maximized by integrating PCI DSS with EMV technology. 

Ensuring the Survivability of a Cryptographic System

Ensuring the Survivability of a Cryptographic System

This article discusses methods of restoring secure systems, such as payment card processing, to normal cryptographic operation after an attack or adverse event is detected and recovering access to critical information.