scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters
Journal ArticleDOI

Randomness analysis and generation of key-derived s-boxes

TL;DR: A custom software framework is developed to generate and evaluate random and key-derived s-boxes generated by some popular cryptosystems like the RC4 stream cipher, and the Blowfish and Twofish block ciphers with the aim of establishing if this kind of s-box are indistinguishable from purely random s- boxes.
Posted Content

Improving software defined cognitive and secure networking

TL;DR: The potential security vulnerabilities in SDN are found, the proposed security platforms and architectures for those vulnerabilities are studied, and future directions for unresolved security vulnerabilities are presented.

Usable Security For Named Data Networking

Yingdi Yu
TL;DR: This dissertation presents a security framework to automate data-centric security of NDN and reduce the enabling overhead, and designed Trust Schema, a name-based policy language to specify trust model, in order to automate fine-grained data authentication.
Proceedings ArticleDOI

A Combination of Timing Attack and Statistical Method to Reduce Computational Complexities of SSL/TLS Side-Channel Attacks

TL;DR: The combination way of timing attack and statistical methods is proposed to reduce the computational complexity of SSL/TLS record protocols in CBC-mode and the experiment result shows it is better than Lucy 13 attack.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.