Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Journal ArticleDOI
Randomness analysis and generation of key-derived s-boxes
Rafael Álvarez,Antonio Zamora +1 more
TL;DR: A custom software framework is developed to generate and evaluate random and key-derived s-boxes generated by some popular cryptosystems like the RC4 stream cipher, and the Blowfish and Twofish block ciphers with the aim of establishing if this kind of s-box are indistinguishable from purely random s- boxes.
Posted Content
Improving software defined cognitive and secure networking
TL;DR: The potential security vulnerabilities in SDN are found, the proposed security platforms and architectures for those vulnerabilities are studied, and future directions for unresolved security vulnerabilities are presented.
Usable Security For Named Data Networking
TL;DR: This dissertation presents a security framework to automate data-centric security of NDN and reduce the enabling overhead, and designed Trust Schema, a name-based policy language to specify trust model, in order to automate fine-grained data authentication.
Proceedings ArticleDOI
A Combination of Timing Attack and Statistical Method to Reduce Computational Complexities of SSL/TLS Side-Channel Attacks
TL;DR: The combination way of timing attack and statistical methods is proposed to reduce the computational complexity of SSL/TLS record protocols in CBC-mode and the experiment result shows it is better than Lucy 13 attack.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.