Optimal key sizes

Optimal key sizes for TLS Authentication

The security in TLS is as strong as the cryptographic algorithms that are used and their respective key sizes. A strong private key is needed to prevent hackers from carrying out impersonation attacks. Algorithms of different strengths and key sizes can be used together for performance, availability or interoperability reasons, provided that sufficient protection is […]

Exploring the anatomy of a TLS cipher suite

When you visit a website that has HTTPS enabled, you can view the TLS cipher suite used for communications. Usually it looks something like this: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 What you see here is actually a set of cryptographic algorithms that are used to secure the network connection through SSL/TLS, using the security properties they represent. Let’s divide […]

RSA

Why RSA is still the most popular public key algorithm

If you work in IT, it’s impossible not to have heard of the famous RSA (Rivest, Shamir and Adleman) encryption algorithm. Even if it dates back to the 70s, it is still the most widespread algorithm for public key cryptography, and for good reasons too! It works While being a rather inductive argument, it is […]