Summary of the Practical Key Management Challenges Behind Symmetric Cryptography in Financial Institutions 

Summary of the Practical Key Management Challenges Behind Symmetric Cryptography in Financial Institutions 

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten advantages as opposed to asymmetric cryptography.

ANSI X9.24-1-2017: Understanding Symmetric Key Creation and Key Component & Key Share Creation

ANSI X9.24-1-2017: Understanding Symmetric Key Creation and Key Component & Key Share Creation

In this article, we look at the process of key generation and key derivation as described by the ANSI X9.24-1-2017 standard. This process is mandatory for operations performed by the retail financial services industry.

ANSI X9.24-1-2017: The General Key Management Requirements

ANSI X9.24-1-2017: The General Key Management Requirements

The ANSI X9.24-1-2017 norm details how symmetric cryptographic keys should be managed and handled by the relevant actors of the retail financial services companies. Here we outline the general techniques and methodologies that are required or suggested by the standard.

ANSI X9.24-1-2017: Understanding the Card Payment Environment and the use of Symmetric Keys

ANSI X9.24-1-2017: Understanding the Card Payment Environment and the use of Symmetric Keys

The standard, ANSI X9.24-1-2017 part 1 has been written to provide minimum symmetric key management requirements and guidelines for the retail financial industry and actors involved in processing card payments.

Summary of cryptographic algorithms - according to NIST

Summary of cryptographic algorithms - according to NIST

The cryptographic protection of a system against attacks and malicious penetration depends on two dimensions: (1) The strength of the keys and the effectiveness of mechanisms and protocols associated with the keys; and (2) the protection of the keys through key management (secure key generation, storage, distribution, use and destruction).

Symmetric Cryptography and Key Management: Considerations on Key Exhaustion, Rotation and Security Models

Symmetric Cryptography and Key Management: Considerations on Key Exhaustion, Rotation and Security Models

With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of information has become increasingly important. The deployment of encryption is the backbone of any given organisation’s systems security scheme towards the goal of data protection.

The Use of Encryption Modes with Symmetric Block Ciphers

The Use of Encryption Modes with Symmetric Block Ciphers

In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers, including the need for padding and initialization vectors.

Symmetric Encryption Algorithms - Their Strengths and Weaknesses, and the Need for Crypto-Agility

Symmetric Encryption Algorithms - Their Strengths and Weaknesses, and the Need for Crypto-Agility

In this article, the second in a 3-part series on symmetric key encryption technology, we look at the development of symmetric key encryption algorithms and the range of algorithms available today along with their strengths and weaknesses, as well as the importance of crypto-agility.

An Overview of Symmetric Encryption and the Key Lifecycle

An Overview of Symmetric Encryption and the Key Lifecycle

In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two types of symmetric algorithm, and the lifecycle and management of symmetric keys.