-
Discover elliptic-curve cryptography
07/05/2023 · 20 min read · cybersecurity cryptography ecc ellipticcurves keyexchange ecdh signature ecdsa encryption ecies cryptauditor ·In this article, I invite you to delve with me once again into the world of cryptography, this time to discover and understand a concept that may seem obscure: elliptic-curve cryptography. Indeed, the mention of the term …
Read More -
Implementing application filtering with nftables and Suricata on Debian
05/02/2023 (updated on 05/10/2024) · 14 min read · cybersecurity networking firewall applicationfiltering nftables suricata debian ·In this article, I invite you to discover or rediscover application filtering, with some help to set up application filtering with a netfilter firewall using the nftables utility and the Suricata tool on the Debian GNU/Linux …
Read More -
flyingroutes: a faster alternative to traceroute
16/12/2022 (updated on 13/09/2024) · 12 min read · cybersecurity networking flyingroutes traceroute ·In this article, I introduce a network diagnostic tool I developed: flyingroutes. The goal is to provide an efficient way to determine the nodes located on a network communication path through a faster alternative to the …
Read More -
Choosing a block cipher mode of operation
In this article, I propose to give you some guidance in choosing the mode of operation for a block cipher. The aim here is to highlight the essential elements to know which mode to use, taking into account security properties as …
Read More -
In this article, I will dissect the concept of Virtual Private Network (VPN) using the Internet Protocol security (IPsec) protocol. The goal is to help you better understand the various steps involved in setting up an IPsec …
Read More