Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Posted Content
Speculative Buffer Overflows: Attacks and Defenses.
TL;DR: The salient vulnerability features and additional hypothetical attack scenarios are described only to the detail necessary to guide hardware and software vendors in threat analysis and mitigations.
Proceedings ArticleDOI
Analyzing Forged SSL Certificates in the Wild
TL;DR: This work has designed and implemented a method to detect the occurrence of SSL man-in-the-middle attack on a top global website, Facebook, and indicates that 0.2% of the SSL connections analyzed were tampered with forged SSL certificates.
Proceedings Article
DROWN: Breaking TLS using SSLv2
Nimrod Aviram,Sebastian Schinzel,Juraj Somorovsky,Nadia Heninger,Maik Dankel,Jens Steube,Luke Valenta,David Adrian,J. Alex Halderman,Viktor Dukhovni,Emilia Käsper,Shaanan Cohney,Susanne Engels,Christof Paar,Yuval Shavitt +14 more
TL;DR: It is concluded that SSLv2 is not only weak, but actively harmful to the TLS ecosystem.
Proceedings ArticleDOI
Markov chain fingerprinting to classify encrypted traffic
Maciej Korczynski,Andrzej Duda +1 more
TL;DR: Stochastic fingerprints for application traffic flows conveyed in Secure Socket Layer/Transport Layer Security sessions are proposed based on first-order homogeneous Markov chains for which the parameters from observed training application traces result in a very good accuracy of application discrimination and a possibility of detecting abnormal SSL/TLS sessions.
Patent
Mobile service routing in a network environment
TL;DR: In this paper, a data flow is received from a mobile network relating to a mobile subscriber and at least one service policy corresponding to the subscriber, the service path including a set of service nodes in a plurality of network service nodes.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.