Cryptography Review

Encrypting your data while it is in transit, at rest, or in use is paramount to ensure the confidentiality of your data is protected. The same applies when hashing is used to assure the integrity of data so that it can be verified it has not been tampered with.

Using out-of-date cryptographic algorithms and protocols is usually a recipe for disaster that can result in data loss, financial liabilities, or damage to an organisation’s reputation.

Get a review and advice on all things crypto related.

Cryptographic Fundamentals

It is often too easy to configure things in such a way that detrimentally affects the goal of protecting data and systems, be it in terms of confidentiality, integrity, authentication, and non-repudiation.

Selecting the correct primitives for an intended outcome requires good understanding of cryptographic fundamentals, so that the appropriate algorithms are used, considering factors like strength, security, and compliance with standards.

Key Management

Effective key management ensures that keys are generated securely with enough entropy, kept secret, are available when needed, and are used properly throughout their lifecycle to secure data.

This usually involves a lot of documentation and familiarity with the processes to ensure there is an auditable trail to assure the integrity of how keys were used from cradle to grave, and that they are offering the expected level of protection for data.

Post-Quantum Cryptography

Quantum computing capabilities are coming and organisations need to start thinking about early planning and migration to post-quantum cryptography (PQC). Implementing and switching to the latest algorithms is not something that can happen quickly in most industries, due to vendor support, library implementations and legacy applications.

Roadmaps and planning need to occur to ensure your organisation can stay up-to-date with the latest guidance to keep your data (and your customer’s data) secure.

Your Cryptography Review covers:

  • A thorough evaluation of your existing cryptographic protocols and practices
  • Examination of the strength and effectiveness of your encryption algorithms
  • Ensuring your hash functions are collision-resistant, irreversible, and immune to common attacks
  • Assessment of your key generation, distribution, storage, rotation, revocation and destruction processes
  • Identification of common pitfalls such as insecure random number generation, improper padding schemes, and side-channel attacks
  • Reviewing practices for alignment with compliance requirements such as PCI DSS
  • Recommendations for moving to post-quantum cryptography (PQC)

Key Features

  • Review Cryptographic Primitives in Use

    Ensure algorithms and protocols are appropriately protecting your sensitive data

  • Key Management

    Review how the lifecycle of keys is managed to prevent unauthorized access or compromise

  • Hierarchy and Inventory

    Ensure you know what each key is protecting and what is downstream from it if compromised

  • Process, Process, Process

    Ensure that cryptographic processes are appropriately documented, in particular for recovery

  • Industry standard

    Alignment with industry standards such as NIST, PCI-DSS, PCI-PIN and best practice

  • Quantum Resistant Roadmap

    Future proofing your cryptographic operations against attacks in the future

Get a review on all things crypto

Obtain advice on key management, types of encryption or appropriate hashing algorithms for your next project to ensure your data is protected

Book a Cryptography Review now