Computation on Encrypted Data (Industry day)

On Friday, the COSIC research group of KU Leuven organised an event arranged by professor Nigel P. Smart in Leuven about computation on encrypted data. More specifically, it was about secure multi-party computation (MPC) and fully homomorphic encryption (FHE).

I learnt a lot about the concepts, the existing and potential use cases of these practical data protection tactics. As a researcher interested in middleware, cloud computing and applied cryptography, it was a fruitful day for me!

Continue reading

Facebooktwittergoogle_plusredditpinterestlinkedinmailby feather

Spring Boot application secured by self-signed HTTPS

In this article we secure our Spring Boot application with HTTPS. First of all we become familiar with TLS/SSL  briefly. Then we see how we can generate a self-signed certificate and secure a simple Spring Boot application. We call this project Spring Boot HTTPS Seed and you can grab the code from my Github. Continue reading

Facebooktwittergoogle_plusredditpinterestlinkedinmailby feather

How PGP works? A simple introduction

The Pretty Good Privacy (PGP) is an encryption strategy for (de)encrypting and signing data in general and email/messages in specific. While doing PGP, two other well-known cryptography algorithms are going to be used: Public-Key (Asymmetric), and Symmetric cryptography. So we firstly discuss these two ingredients, and then the PGP recipe.
Continue reading

Facebooktwittergoogle_plusredditpinterestlinkedinmailby feather