scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters
Journal ArticleDOI

Modeling Advanced Security Aspects of Key Exchange and Secure Channel Protocols

TL;DR: This thesis introduces a new model for multi-stage key exchange to capture that recent designs for secure connections establish several cryptographic keys for various purposes and with differing levels of security, and introduces a formalism for key confirmation.
Book ChapterDOI

What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS.

TL;DR: The first taxonomy of TLS downgrade attacks is created, which highlights clear and concrete aspects that many downgrade attacks have in common, and allows for a common language, classification, and comparison of adowngrade attacks.
Book ChapterDOI

The Sum Can Be Weaker Than Each Part

TL;DR: The security of summing the outputs of two independent hash functions is studied, in an effort to increase the security of the resulting design, or to hedge against the failure of one of the hash functions.
Proceedings ArticleDOI

RFC-directed differential testing of certificate validation in SSL/TLS implementations

TL;DR: This work proposes a novel differential testing approach which is directed by the standard Request For Comments (RFC) and has the following advantages: certificates of RFCcert are discrepancy-targeted since they are assembled according to standards instead of genetics, and not only reveals the invalidity of traditional differential testing but also is able to conduct testing thatTraditional differential testing cannot do.
Book ChapterDOI

Modelling Ciphersuite and Version Negotiation in the TLS Protocol

TL;DR: The ACCE model is extended to cover protocols with many different sub-protocols, capturing both multiple ciphersuites and multiple versions, and a security notion for secure negotiation of the optimal sub-Protocol is defined.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.