Blog posts

2025

A Trip on PKCS11 Boat

9 minute read

Published:

From smartcards to secure elements, PKCS#11 is the backbone of many modern cryptographic operations; yet for most developers, it still feels like a black box. This article breaks it down from a beginner’s perspective: what it is, why it matters, and how to start using it with real examples.

Linux Persistence Mechanisms

9 minute read

Published:

Persistence is a key stage in any cyberattack: once inside, attackers aim to secure a way back even if their original access is closed. At Black Hat USA 2025, John Hammond highlighted several lesser-known Linux persistence techniques that defenders should watch for.

Le perceptron

12 minute read

Published:

This article gives a brief overview of the basic building block of neural networks: the perceptron. For a change, I’m writing this article in French. Enjoy the read!

(Tutorial) PKI deployment and usage

18 minute read

Published:

This tutorial offers a practical, hands-on walkthrough of everything we’ve covered about certificates and Public Key Infrastructure (PKI).Now it’s time to move from theory to real-world application: you’ll learn how to set up your own private Certificate Authority, issue certificates, and secure your web applications with that satisfying little padlock icon in your browser (for real).

The Role of HSMs in Protecting Cryptographic Keys

13 minute read

Published:

This article presents a specific device that plays a crucial role in protecting the chain of trust in a PKI: the HSM. It serves as a good introduction for those who need to understand the key components of these devices.

PKI (Public Key Infrastructure)

15 minute read

Published:

In this article, I explore Public Key Infrastructure (PKI) and its essential role in establishing trust across digital communications. By the end of this article, you’ll understand the mechanisms that make secure connections possible, far beyond just the padlock icon in your browser, and how PKI prevents attackers from impersonating trusted parties online.

Digital Certificates

12 minute read

Published:

In this article, I discuss digital certificates and their crucial role in securing internet communications. By the end of this article, you will understand what lies behind the small padlock icon that appears on the left side of your browser’s address bar.

Elliptic Curve Cryptography (ECC) - Part 2

6 minute read

Published:

For this second article on Elliptic Curve Cryptography (ECC), we will discuss how elliptic curves can be defined over finite fields, and what group operations can be performed on their points.

Elliptic Curve Cryptography (ECC) - Part 1

3 minute read

Published:

If you’ve ever created an RSA-based SSH key, you might have been surprised by the size of the key it generated. Elliptic Curve Cryptography (ECC), on the other hand, offers much shorter keys while maintaining the same level of security. Since its introduction, ECC has steadily gained popularity and has increasingly replaced RSA for both confidentiality (encryption) and non-repudiation (digital signatures). This is the first post in a series on Elliptic Curve Cryptography.

Advanced Encryption Standard (AES)

15 minute read

Published:

If I were asked to identify a common point between banking transactions, internet communication, and important documents, I would say it’s the need for confidentiality. Confidentiality means preventing unauthorized access to information. At the time of writing this post, one of the most widely used algorithms to ensure confidentiality is AES, also known as Rijndael. This blog post briefly covers everything you need to know about AES.