Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Proceedings ArticleDOI
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
Ewa Syta,Iulia Tamas,Dylan Visher,David Isaac Wolinsky,Philipp Jovanovic,Linus Gasser,Nicolas Gailly,Ismail Khoffi,Bryan Ford +8 more
TL;DR: CoSi, a scalable witness cosigning protocol ensuring that every authoritative statement is validated and publicly logged by a diverse group of witnesses before any client will accept it, is introduced, offering the first transparency mechanism effective against persistent man-in-the-middle attackers.
Proceedings ArticleDOI
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations
TL;DR: This work designs, implements, and applies the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations, and implements and applies "frankencerts," synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints.
Proceedings ArticleDOI
Implementing TLS with Verified Cryptographic Security
TL;DR: A verified reference implementation of TLS 1.2 is developed, including security specifications for its main components, such as authenticated stream encryption for the record layer and key establishment for the handshake, and typecheck the protocol state machine.
Proceedings Article
Under-constrained symbolic execution: correctness checking for real code
David A. Ramos,Dawson Engler +1 more
TL;DR: This paper uses UC-KLEE as a generalized checking framework and implement checkers to find memory leaks, uninitialized data, and unsafe user input, and evaluates the checkers on over 20,000 functions from BIND, OpenSSL, and the Linux kernel, finding 67 bugs.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.