DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Document

Guidelines on cryptographic algorithms usage and key management

European Payments Council (EPC)

Reading Time: 2 mins read
in Career, Cryptography, Document, Report

This document is aimed to provide guidance to the European payments community on algorithm usage and key management issues.

It contains some recommendations from EPC on algorithm usage and key management issues that the payment service providers may consider together with their own security policy and the relevant professional or national rules and regulations they have to comply with.

These guidelines recommend use of International Standards where appropriate. It also addresses the points that should be considered whenever payment service providers wish to provide interoperable services based on cryptographic mechanisms. These points may be of particular interest for secured cross-border services.

The scope of this document is limited to cryptographic algorithms and key management. Amongst the mechanisms excluded from its scope are:

• error detecting mechanisms such as Cyclic Redundancy Check,
• data compression facilities such as Zip or Huffman coding,
• side-channel countermeasures and protocol layer interdependency checking,
• secret algorithms, for which no technical features are available.

The world of cryptography being wide and rapidly expanding, this document focuses on algorithms which are suitable for payment services, and which are already adopted by the financial industry or which are likely to be in the foreseeable future.

In order to cope with the rapid evolution of the technology, this report is updated yearly.

GET DOCUMENT

Tags: cryptographyCryptography DocumentsCryptography ReportsCybersecurityDocumentsencryptionEncryption DocumentsEncryption ReportsReport
ADVERTISEMENT

Related Posts

IT Security: Password Security Awareness

March 29, 2023
Password Management Techniques

Password Management Techniques

March 29, 2023
Proper Password Management

Proper Password Management

March 29, 2023
Password and Authentication

Password and Authentication

March 29, 2023

More Articles

Alerts

Earth Bogle: Campaigns Target the Middle East with Geopolitical Lures

January 17, 2023
Cyber101

Enterprise password managers

March 27, 2023

Wireless and Mobile Device Security

April 22, 2021
Alerts

Google Chrome security advisory

July 5, 2022
Course

CyberSec First Responder: Threat Detection & Response CFR210

May 2, 2022
Alerts

Pakistan APT Group Targets Android Users

March 7, 2023
Incidents

Hack on a Services Firm’s Vendor Affects 271,000 Patients

December 20, 2022
Course

Software Testing and Automation Specialization

June 27, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.