-
Getting started with post-quantum cryptography: the ML-KEM key exchange
03/07/2025 · 19 min read · cybersecurity quantum-physics quantum-computer qubit cryptography post-quantum-cryptography pqc lattices mlwe kem kyber ml-kem ·In this article, I invite you to discover the wonderful world of post-quantum cryptography with the Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) key exchange algorithm, also known as Kyber and standardized in August …
Read More -
In this article, I invite you to discover the MASQUE proxies, which enable the proxification of Web traffic relying on HTTP/3 or even the tunneling of communications with HTTP/3. MASQUE provides compatibility of the proxy or VPN …
Read More -
Automating the protection of a network from denial of service with RTBH, NetFlow, goBGP and FastNetMon
In this article, I will introduce Remotely-Triggered Black Hole (RTBH), a technology based on the Border Gateway Protocol (BGP) routing protocol and designed to provide the ability to block unwanted network traffic in order to …
Read More -
Decoding TLS Encrypted Client Hello extension
01/12/2023 (updated on 10/03/2025) · 12 min read · cybersecurity cryptography privacy tls ech hpke sni ·In this article, I would like to introduce you to Encrypted Client Hello (ECH), an extension of the Transport Layer Security (TLS) network protocol designed to guarantee enhanced privacy. The main idea is to make certain Web …
Read More -
At the heart of the Kerberos protocol
24/09/2023 (updated on 05/09/2024) · 12 min read · cybersecurity cryptography authentication krb kerberos ticket ·In this article, I take you to the heart of a network protocol that has been widely used for years and yet is not very well understood: Kerberos. Indeed, during professional discussions, I often realize that although Kerberos is …
Read More