Java VM uses a generational garbage collector, which relies on the below two observations: Most allocated objects will become unreachable quickly There are few references from older object to younger objects According to the above hypothesis, Java VM divides the… Read More
a few words about RSA
Symmetric Key Cryptography is used to transfer a message securely between two endpoints using a shared secret key. The message is encrypted using a shared secret key in one endpoint and transferred to the other endpoint. Then the message is… Read More
Diffie Hellman Key Exchange Algorithm
In an interview, one may be asked how an security connection is established between two endpoints using TLS protocol. He may answer the below steps: 1. A client sends a ClientHello message to a server with the client capabilities 2.… Read More
recommend a website for tls handshake analysis
These days I read a few articles about Transport Layer Security (TLS) protocol. I found two articles that are good enough to dive into the TLS handshake. For TLS 1.2 https://tls.ulfheim.net/ For TLS 1.3 https://tls13.ulfheim.net/ These two articles analyze… Read More