Key Exchange

Please read my previous article on TLS to understand the key exchange step. Key exchange is a protocol, where keys are shared between two trusted parties over an untrusted network. The keys can then be used to perform other cryptographic operations like encryption, decryption, signing, etc. Key exchange is a fundamental construct used to secure… Continue reading Key Exchange

Service-to-Service Authentication on the Cloud

Overview Service-to-Service authentication over the cloud is probably one of most common authentication scenarios that are required. A service calling another service could be within the same domain boundary, e.g. a micro service calling another micro service or could be across the domain if the service is calling another service outside its own boundary. Essentially,… Continue reading Service-to-Service Authentication on the Cloud

Managing Secrets for your Service in the Cloud

Application in the cloud ranges from a simple single page application to complex applications running complex logics across multiple boundaries and geographic regions. Irrespective of what kind they are, they must deal with secrets. Managing secrets is usually hard, especially when the application needs to be compliant, and the application has a big user base,… Continue reading Managing Secrets for your Service in the Cloud

Asymmetric Encryption in your .Net Application

For almost all applications in the cloud, there are times when the developer needs to write some code to perform encryption. Most of the scenarios can be fulfilled with a symmetric key encryption, but the key management becomes harder when the encryption and the decryption are across multiple security boundaries. The best options in such a… Continue reading Asymmetric Encryption in your .Net Application