-
At the heart of the Kerberos protocol
24/09/2023 (updated on 05/09/2024) · 12 min read · cybersecurity cryptography authentication krb kerberos ticket ·
In this article, I take you to the heart of a network protocol that has been widely used for years and yet is not very well understood: Kerberos. Indeed, during professional discussions, I often realize that although Kerberos is …
Read More -
Discover elliptic-curve cryptography
07/05/2023 · 20 min read · cybersecurity cryptography ecc ellipticcurves keyexchange ecdh signature ecdsa encryption ecies cryptauditor ·
In this article, I invite you to delve with me once again into the world of cryptography, this time to discover and understand a concept that may seem obscure: elliptic-curve cryptography. Indeed, the mention of the term …
Read More -
Implementing application filtering with nftables and Suricata on Debian
05/02/2023 (updated on 05/10/2024) · 14 min read · cybersecurity networking firewall applicationfiltering nftables suricata debian ·
In this article, I invite you to discover or rediscover application filtering, with some help to set up application filtering with a netfilter firewall using the nftables utility and the Suricata tool on the Debian GNU/Linux …
Read More -
flyingroutes: a faster alternative to traceroute
16/12/2022 (updated on 13/09/2024) · 12 min read · cybersecurity networking flyingroutes traceroute ·
In this article, I introduce a network diagnostic tool I developed: flyingroutes. The goal is to provide an efficient way to determine the nodes located on a network communication path through a faster alternative to the …
Read More -
Choosing a block cipher mode of operation

In this article, I propose to give you some guidance in choosing the mode of operation for a block cipher. The aim here is to highlight the essential elements to know which mode to use, taking into account security properties as …
Read More