Blogs

Build Secure and Private Blockchains with Hyperledger Fabric

What is Hyperledger Fabric? Hyperledger Fabric is an open source, permissioned blockchain framework, started in 2015 by The Linux Foundation. It is a modular, general-purpose framework that offers unique identity management and access control features, which make it suitable for a variety of industry applications such as track-and-trace of supply chains, trade finance, loyalty and

Read More »

Get Started with Hyperledger Fabric: A Guide to the Main Documentation

Introduction Hyperledger Fabric is a platform for distributed ledger solutions underpinned by a modular architecture delivering high degrees of confidentiality, resiliency, flexibility, and scalability. It is designed to support pluggable implementations of different components and accommodate the complexity and intricacies that exist across the economic ecosystem. We recommend first-time users begin by going through the

Read More »

RSA and ECDSA Certificates: Which Algorithm is Better? 

ECDSA and RSA are two of the world’s most widely adopted asymmetric algorithms. However, both these algorithms are significantly different when it comes to the way they function and how their keys are generated.  In this blog post, we will briefly examine the differences between RSA and ECDSA certificates to help you understand what they

Read More »

What is Payment HSM? 

A Payment HSM is meant to tighten the layers of security for concealing the sensitive information required by the retail banking industry for payment purposes. Therefore, it is ideal as it functions per the payment industry standards while maintaining adequate security for the cryptographic keys. It is a standard, tamper-resistant, hardened device that can enforce

Read More »

What are HSM devices & their benefits? 

A Hardware Security Module refers to a tamper-resistant hardware device meant to strengthen the security of cryptographic keys. It is a special “trusted” device that can perform diverse cryptographic operations in a trusted environment. These devices are ideal for performing decryption, encryption, and authentication for the appropriate use of any application, database, and identity while

Read More »

ECC Vs RSA Certificate Difference: Decoding the Cryptographic Algorithm

When we talk about securing online communications, ECC and RSA are both encryption algorithms that are inevitable to mention. These algorithms are typically used in SSL/TLS certificates to ensure the security of communication that takes place in the digital space. So naturally, ECC vs. RSA might confuse many.  While buying an SSL certificate, the dilemma

Read More »

What is the Difference between HSM and KMS? 

The difference between HSM and KMS is that HSM forms the strong foundation for security, secure generation, and usage of cryptographic keys. At the same time, KMS is responsible for offering streamlined management of cryptographic keys’ lifecycle as per the pre-defined compliance standards.  Managing cryptographic relationships in small or big-scale environments seems challenging, given that

Read More »

Cryptographic Keys 101: What They Are & How They Secure Data (P.2)   

Cryptographic keys are essential tools for protecting sensitive data. They are used to encrypt and decrypt data, ensuring that it can only be accessed by authorized individuals. Cryptographic keys are used in a wide variety of applications, including online banking, secure communication, and data storage.  There are two main types of cryptographic keys: symmetric and

Read More »