scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters
Posted Content

Speculative Buffer Overflows: Attacks and Defenses.

TL;DR: The salient vulnerability features and additional hypothetical attack scenarios are described only to the detail necessary to guide hardware and software vendors in threat analysis and mitigations.
Proceedings ArticleDOI

Analyzing Forged SSL Certificates in the Wild

TL;DR: This work has designed and implemented a method to detect the occurrence of SSL man-in-the-middle attack on a top global website, Facebook, and indicates that 0.2% of the SSL connections analyzed were tampered with forged SSL certificates.
Proceedings ArticleDOI

Markov chain fingerprinting to classify encrypted traffic

TL;DR: Stochastic fingerprints for application traffic flows conveyed in Secure Socket Layer/Transport Layer Security sessions are proposed based on first-order homogeneous Markov chains for which the parameters from observed training application traces result in a very good accuracy of application discrimination and a possibility of detecting abnormal SSL/TLS sessions.
Patent

Mobile service routing in a network environment

TL;DR: In this paper, a data flow is received from a mobile network relating to a mobile subscriber and at least one service policy corresponding to the subscriber, the service path including a set of service nodes in a plurality of network service nodes.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.