scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters
Posted Content

Server Notaries: A Complementary Approach to the Web PKI Trust Model.

TL;DR: In this article, the authors proposed a practical mechanism that enables servers to get their certificate views across the Internet, making detection of a certificate substitution attack possible, and they have conducted simulation experiments and evaluated their proposal using publicly available, real-world BGP data.
Posted Content

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation.

TL;DR: BLINKER as discussed by the authors is a light-weight cryptographic suite and record protocol built from a single permutation, based on the Sponge construction used by the SHA-3 algorithm KECCAK.
Book ChapterDOI

E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet

TL;DR: In this paper, an SSL Security-Enhanced method E-SSL is proposed to detect and defeat SSL Man-in-the-Middle (MITM) attacks, which improves the security of internet communication under malicious attacks.
Patent

Information processing apparatus, method of controlling the same, and storage medium

TL;DR: In this paper, an information processing apparatus receives a request from a Web server over a network, adds security information to the request, and determines whether to process the request based on the security information which is added to the requested request.
Journal Article

On the Possibility of a Backdoor in the Micali-Schnorr Generator

TL;DR: In this paper , the authors study the security of the Micali-Schnorr PRG and the RSA PRG, and show that the PRG remains secure even if one replaces RSA with a publicly evaluatable PRG or a function modeled as an efficiently invertible random permutation.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.