Books I read in 2024
Published:
Books I read in 2024. Tries to avoid spoiling as much as possible and therefore does not contain a very deep analysis or review of most books.
Published:
Books I read in 2024. Tries to avoid spoiling as much as possible and therefore does not contain a very deep analysis or review of most books.
Published:
Some notes on X3DH (Extended Triple Diffie-Hellman).
Published:
Some notes about how TLS v1.3 works. This is a follow-up of the previous episode about TLS v1.2. As before, the goal is to have a high-level overview about how the protocol works, what is the role of the different messages and be able to understand (and debug) a network traffic dump.
Published:
Some notes about how TLS v1.2 (Transport Layer Security) works. The goal explain what is going on in a network traffic dump, the role of the different TLS extensions, the impact of the different cipher suites on security, etc. It includes several diagrams and many references.
Published:
The Diffie-Hellman (DH) key exchange (and variants thereof) is widely used in many protocols (such as TLS, SSH, IKE (IPSec), Signal, etc.) to bootstrap some symmetric key material which may then be used to secure communication channel between two parties. This introduction focuses on the different ways the DH key exchange is used in practice in several protocols (especially TLS) and the impact of these different approaches on the security. This is intended as a prelude for the upcoming next episodes about how TLS works.
Page 1 of 1 | Previous page | Next page | JSON Feed | Atom Feed