Asim Mehmood

Asim Mehmood is a security research engineer, holding a Master and a Bachelor of Science in Information Security.
Asim's core professional experience and competence is centered around
- Applied Classical & Modern Cryptography & Information
- Key Management
- HSMs
- Development of Public Key Infrastructure (PKI).
- Smart card enabled Key Management System in C#.
- Vulnerability assessment and Penetration Testing.
- Smart Card Applications development on Windows and Linux.
- LDAP and Secure LDAP Integration in Web Applications.
Asim loves music and reading.

PCI PIN Transaction Security (PTS) HSM v3 Requirements

Hardware Security Modules are a critical component in data integrity and confidentiality assurance of business transactions. Corporate organizations and banks employ security services such as encryption, decryption and strong authentication between identities and applications.

Read more

Atalla AT1000: Utimaco’s PCI PTS HSM v3 compliant HSM

Since the release of PCI PIN Transaction Security (PTS) Hardware Security Module (HSM) version 3.0 in June 2016, companies had started working on v3.0 compliant HSMs which is necessary for security and legal obligations. HSMs are meant to be certified by the PCI, ISO, NIST and ANSI etc. Utimaco has released the HSM Atalla AT1000 which is not only PCI PTS HSM Version 3.0 compliant but also FIPS 140-2 Level 3 validated system.

Read more

Distinctive Requirements between PCI PTS HSM v2.0 and v3.0

The HSM is a vital component in guaranteeing the secrecy and additionally information integrity of business transactions. HSMs are appropriately secure during their entire lifecycle to help incite trust in the authenticity of the business transactions. Since the release of PCI PIN Transaction Security (PTS) Hardware Security Module (HSM) version 3 in June 2016, companies have started working on v3 compliant HSMs which is necessary for security and legal obligations.

Read more

NIST's Hybrid Mode Approach to Post-Quantum Computing - why crypto agility is crucial

With the advent of information security, the importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.

Read more

The PCI PTS HSM v1 expires - Guidelines for the Transition Towards v3

Corporate organizations and banks have expanded their businesses around the world by using e-commerce which is secured by various security services such as encryption, decryption and strong authentication between identities and applications. Main cryptographic security control for the protection of business transactions is the Hardware Security Module (HSM).

Read more

PCI DSS - Physical Security Requirements for HSMs

Organizations have been crucially reliant on the internet for their business workflows. Due to this enhanced exposure, organizations are facing new threats on a daily basis that dictates the incorporation of cryptographic services.

Read more

State of Symmetric & Hash Algorithms after Quantum Computing

The recent trends in information technology and communications have emerged as one of the main technological pillars of the modern age. The importance of cryptography has gained importance due to the requirement of security services (confidentiality, integrity, authenticity, and non-repudiation) in data storage/transmission.

Read more

How HSMs support secure multi-tenancy?

 As business grew, so did the threat of compromise or theft of data.  To address these risks, both software methods and hardware devices were produced to secure networks, systems and data.  HSMs are dedicated devices, incorporated with both logical and physical protection mechanisms, designed to provide separate, secure operating environments where confidential or sensitive information could be treated without risk of exposure.   

Read more

NIST shortlisted 26 algorithms for focal post-quantum research - get all the details here

It has taken over two decades to establish and secure the current e-commerce applications. The security of most of these systems principally relies on cryptographic algorithms which have served the purpose till now. Since the initiation and evolution of quantum computing, some cryptographic algorithms have threats. To mitigate the security gap, numerous post-quantum algorithms have been proposed. This article enlightens the journey towards post-quantum algorithms and security parameters of the newly proposed post-quantum algorithms.

Read more

Ready to take off?

Download our HSM simulator!

Register for free