Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Journal ArticleDOI
Modeling Advanced Security Aspects of Key Exchange and Secure Channel Protocols
TL;DR: This thesis introduces a new model for multi-stage key exchange to capture that recent designs for secure connections establish several cryptographic keys for various purposes and with differing levels of security, and introduces a formalism for key confirmation.
Book ChapterDOI
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS.
TL;DR: The first taxonomy of TLS downgrade attacks is created, which highlights clear and concrete aspects that many downgrade attacks have in common, and allows for a common language, classification, and comparison of adowngrade attacks.
Book ChapterDOI
The Sum Can Be Weaker Than Each Part
Gaëtan Leurent,Lei Wang +1 more
TL;DR: The security of summing the outputs of two independent hash functions is studied, in an effort to increase the security of the resulting design, or to hedge against the failure of one of the hash functions.
Proceedings ArticleDOI
RFC-directed differential testing of certificate validation in SSL/TLS implementations
TL;DR: This work proposes a novel differential testing approach which is directed by the standard Request For Comments (RFC) and has the following advantages: certificates of RFCcert are discrepancy-targeted since they are assembled according to standards instead of genetics, and not only reveals the invalidity of traditional differential testing but also is able to conduct testing thatTraditional differential testing cannot do.
Book ChapterDOI
Modelling Ciphersuite and Version Negotiation in the TLS Protocol
Benjamin Dowling,Douglas Stebila +1 more
TL;DR: The ACCE model is extended to cover protocols with many different sub-protocols, capturing both multiple ciphersuites and multiple versions, and a security notion for secure negotiation of the optimal sub-Protocol is defined.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.