The use of encryption is becoming increasingly common as a means to keep information secure. We use standard symmetric and asymmetric algorithms in our cryptographic library software.
Using widely available, well-known and standardised algorithms it is relatively easy to implement cryptographic functions in software. An often overlooked part of developing cryptographic systems is that of managing cryptographic keys, both on local devices and in centralised key management systems.
Often used in conjunction with or part of key management systems, authentication protocols enable cryptographic verification of users and end-devices.
The WannaCry ransomware outbreak in May showed how devastating these kinds of attacks can be to services we depend upon. Read our ransomware guide to learn more about this
increasingly significant problem for businesses and organisations
Complete our GDPR Survey and find out whether your business complies with the new legislation.