Exploring the anatomy of a TLS cipher suite

When you visit a website that has HTTPS enabled, you can view the TLS cipher suite used for communications. Usually it looks something like this: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 What you see here is actually a set of cryptographic algorithms that are used to secure the network connection through SSL/TLS, using the security properties they represent. Let’s divide […]


Why RSA is still the most popular public key algorithm

If you work in IT, it’s impossible not to have heard of the famous RSA (Rivest, Shamir and Adleman) encryption algorithm. Even if it dates back to the 70s, it is still the most widespread algorithm for public key cryptography, and for good reasons too! It works While being a rather inductive argument, it is […]

SSL Certificates

Understanding the different types of SSL certificates

What happens when a client connects to an SSL-secured Web site? The first step is that the browser tries to connect to the web server, asking for its certificate, in order to verify whether the server has an SSL-secure connection or not. The latter will answer with a copy of its SSL certificate, and this […]


5 reasons to switch to HTTPS

According to Google, the number of websites using HTTPS has doubled in the last 24 months. Personally, I still think that not enough websites made the transition, despite the numerous advantages of this protocol. For those of you who are still skeptical about switching to HTTPS, I will give you 5 reasons that will potentially […]

I see you

Why care about online privacy?

We use the internet every day. It’s impossible to imagine our lives without it. We would feel quite primitive without email, social networking, shopping, or the good ol’ Google search. It’s quite clear that the internet plays a major role in our day-to-day routine. But have you ever thought about the traces left by this […]