Showing items from Cybersecurity

post-thumb

What's quantum cryptography?


A quantum introduction

Quantum physic is getting discovered during the 20th century and is made of multiple theories that seem to solve current classical physic problems. Actually, it is so important that where quantum laws applies, Newton’s don’t. And vice versa. It describes two worlds where physics laws are just not the same. And this is why it radically changes the cryptography concept. We do not use commons physics laws but we use quantum one’s. And as we will see, these new rules allow us to be faster and stronger.

Read more Details
S …

Same-site cookie, a new protection against CSRF

CSRF has long been a well-known topic in the OWASP Top 10. Many protections and mitigations exist and are more or less easy to implement (synchronized token, custom request header, encrypted token, double submit cookie pattern,…). A new kid on the block has recently emerged and is increasingly supported by recent browsers: a very simple mitigation based on the SameSite cookie attribute.

Read more Details
post-thumb

BlockChain : les adresses sont-elles sécurisées ?

Tout utilisateur de BlockChain est représenté par un trio de grands nombres : l’adresse qu’il utilise sur la BlockChain, la clé publique qui permet à chacun de vérifier les transactions de cet utilisateur et la clé privée que l’utilisateur garde secrètement et qui lui permet de signer ses transactions. Usurper l’identité d’un utilisateur sur une BlockChain revient donc à s’accaparer ce trio. On est donc en droit de se demander à quel point le système est sécurisé.

Read more Details
post-thumb

On the (in)security of Internet routing

How is routing done in the Internet today?

Today, we live a connected life, and we often take the Internet for granted. But if you think twice about it, Internet is a kind of little miracle. Indeed, for the Internet to work properly, thousands of networks need to cooperate. Those networks are built and administrated by different companies, universities or individuals. Yet, their loose cooperation is needed in order for you to be able to see the cat GIF image that someone else has posted on a website.

Read more Details