Description

Book Synopsis

Although cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms remain a black box for most users of these tools. Just as a sane backend developer does not drill down into low-level disk access details of a server filesystem, payments professionals have enough things to worry about before they ever need to bother themselves with debugging an encrypted value or a message digest. However, at a certain point, an engineer faces the need to identify a problem with a particular algorithm or, perhaps, to create a testing tool that would simulate a counterpart in a protocol that involves encryption.

The world of cryptography has moved on with giant leaps. Available technical standards mention acronyms and link to more standards, some of which are very large while others are not available for free. After finding the standards for the algorithm, the specific mode of operation must also be identified. Most implementations use sever

Table of Contents
1. Building Blocks 2. Understanding Payments 3. Securing the Plastic :Magnetic Stripe and EMV 4. Securing the Network 5. Protecting the PIN 6. Regulation and Compliance A. Bits and Digits B. RSA D. PIN Examples E. JOSE Example F. Standard Bodies

Cryptography for Payment Professionals

Product form

£94.99

Includes FREE delivery

RRP £99.99 – you save £5.00 (5%)

Order before 4pm tomorrow for delivery by Tue 27 Jan 2026.

A Hardback by Ilya Dubinsky

15 in stock


    View other formats and editions of Cryptography for Payment Professionals by Ilya Dubinsky

    Publisher: Taylor & Francis Ltd
    Publication Date: 1/10/2023 12:05:00 AM
    ISBN13: 9781032442747, 978-1032442747
    ISBN10: 1032442743

    Description

    Book Synopsis

    Although cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms remain a black box for most users of these tools. Just as a sane backend developer does not drill down into low-level disk access details of a server filesystem, payments professionals have enough things to worry about before they ever need to bother themselves with debugging an encrypted value or a message digest. However, at a certain point, an engineer faces the need to identify a problem with a particular algorithm or, perhaps, to create a testing tool that would simulate a counterpart in a protocol that involves encryption.

    The world of cryptography has moved on with giant leaps. Available technical standards mention acronyms and link to more standards, some of which are very large while others are not available for free. After finding the standards for the algorithm, the specific mode of operation must also be identified. Most implementations use sever

    Table of Contents
    1. Building Blocks 2. Understanding Payments 3. Securing the Plastic :Magnetic Stripe and EMV 4. Securing the Network 5. Protecting the PIN 6. Regulation and Compliance A. Bits and Digits B. RSA D. PIN Examples E. JOSE Example F. Standard Bodies

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account