Description
Book SynopsisAlthough cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms remain a black box for most users of these tools. Just as a sane backend developer does not drill down into low-level disk access details of a server filesystem, payments professionals have enough things to worry about before they ever need to bother themselves with debugging an encrypted value or a message digest. However, at a certain point, an engineer faces the need to identify a problem with a particular algorithm or, perhaps, to create a testing tool that would simulate a counterpart in a protocol that involves encryption.
The world of cryptography has moved on with giant leaps. Available technical standards mention acronyms and link to more standards, some of which are very large while others are not available for free. After finding the standards for the algorithm, the specific mode of operation must also be identified. Most implementations use sever
Table of Contents
1. Building Blocks 2. Understanding Payments 3. Securing the Plastic :Magnetic Stripe and EMV 4. Securing the Network 5. Protecting the PIN 6. Regulation and Compliance A. Bits and Digits B. RSA D. PIN Examples E. JOSE Example F. Standard Bodies