Optimal key sizes

Optimal key sizes for TLS Authentication

The security in TLS is as strong as the cryptographic algorithms that are used and their respective key sizes. A strong private key is needed to prevent hackers from carrying out impersonation attacks. Algorithms of different strengths and key sizes can be used together for performance, availability or interoperability reasons, provided that sufficient protection is […]

Exploring the anatomy of a TLS cipher suite

When you visit a website that has HTTPS enabled, you can view the TLS cipher suite used for communications. Usually it looks something like this: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 What you see here is actually a set of cryptographic algorithms that are used to secure the network connection through SSL/TLS, using the security properties they represent. Let’s divide […]

RSA

Why RSA is still the most popular public key algorithm

If you work in IT, it’s impossible not to have heard of the famous RSA (Rivest, Shamir and Adleman) encryption algorithm. Even if it dates back to the 70s, it is still the most widespread algorithm for public key cryptography, and for good reasons too! It works While being a rather inductive argument, it is […]

How to configure SSH key-based authentication in Linux

So you have your own Linux/Unix server. Congratulations! You probably access it using SSH protocol. Most people start using SSH by using password-based login, but re-entering the password every time when connecting to the server can become very tedious, especially when doing repetitive tasks. OpenSSH has many powerful features that render system management easier if […]

Debian Stretch

Debian 9 is awesome

You might have heard it everywhere on the net, but in case you didn’t know, Debian 9 Stretch came out on the 17th of June. I downloaded it that same same day and played with it quite a bit, and I have to say it is awesome! FYI, Stretch is the name of the little […]

SSL Certificates

Understanding the different types of SSL certificates

What happens when a client connects to an SSL-secured Web site? The first step is that the browser tries to connect to the web server, asking for its certificate, in order to verify whether the server has an SSL-secure connection or not. The latter will answer with a copy of its SSL certificate, and this […]

https

5 reasons to switch to HTTPS

According to Google, the number of websites using HTTPS has doubled in the last 24 months. Personally, I still think that not enough websites made the transition, despite the numerous advantages of this protocol. For those of you who are still skeptical about switching to HTTPS, I will give you 5 reasons that will potentially […]

I see you

Why care about online privacy?

We use the internet every day. It’s impossible to imagine our lives without it. We would feel quite primitive without email, social networking, shopping, or the good ol’ Google search. It’s quite clear that the internet plays a major role in our day-to-day routine. But have you ever thought about the traces left by this […]