-
Getting started with post-quantum cryptography: the ML-KEM key exchange
03/07/2025 · 19 min read · cybersecurity quantum-physics quantum-computer qubit cryptography post-quantum-cryptography pqc lattices mlwe kem kyber ml-kem ·In this article, I invite you to discover the wonderful world of post-quantum cryptography with the Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) key exchange algorithm, also known as Kyber and standardized in August …
Read More -
Decoding TLS Encrypted Client Hello extension
01/12/2023 (updated on 10/03/2025) · 12 min read · cybersecurity cryptography privacy tls ech hpke sni ·In this article, I would like to introduce you to Encrypted Client Hello (ECH), an extension of the Transport Layer Security (TLS) network protocol designed to guarantee enhanced privacy. The main idea is to make certain Web …
Read More -
At the heart of the Kerberos protocol
24/09/2023 (updated on 05/09/2024) · 12 min read · cybersecurity cryptography authentication krb kerberos ticket ·In this article, I take you to the heart of a network protocol that has been widely used for years and yet is not very well understood: Kerberos. Indeed, during professional discussions, I often realize that although Kerberos is …
Read More -
Discover elliptic-curve cryptography
07/05/2023 · 20 min read · cybersecurity cryptography ecc ellipticcurves keyexchange ecdh signature ecdsa encryption ecies cryptauditor ·In this article, I invite you to delve with me once again into the world of cryptography, this time to discover and understand a concept that may seem obscure: elliptic-curve cryptography. Indeed, the mention of the term …
Read More -
Choosing a block cipher mode of operation
In this article, I propose to give you some guidance in choosing the mode of operation for a block cipher. The aim here is to highlight the essential elements to know which mode to use, taking into account security properties as …
Read More