Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Posted Content
Server Notaries: A Complementary Approach to the Web PKI Trust Model.
Emre Yüce,Ali Aydın Selçuk +1 more
TL;DR: In this article, the authors proposed a practical mechanism that enables servers to get their certificate views across the Internet, making detection of a certificate substitution attack possible, and they have conducted simulation experiments and evaluated their proposal using publicly available, real-world BGP data.
Posted Content
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation.
TL;DR: BLINKER as discussed by the authors is a light-weight cryptographic suite and record protocol built from a single permutation, based on the Sponge construction used by the SHA-3 algorithm KECCAK.
Book ChapterDOI
E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet
TL;DR: In this paper, an SSL Security-Enhanced method E-SSL is proposed to detect and defeat SSL Man-in-the-Middle (MITM) attacks, which improves the security of internet communication under malicious attacks.
Patent
Information processing apparatus, method of controlling the same, and storage medium
TL;DR: In this paper, an information processing apparatus receives a request from a Web server over a network, adds security information to the request, and determines whether to process the request based on the security information which is added to the requested request.
Journal Article
On the Possibility of a Backdoor in the Micali-Schnorr Generator
TL;DR: In this paper , the authors study the security of the Micali-Schnorr PRG and the RSA PRG, and show that the PRG remains secure even if one replaces RSA with a publicly evaluatable PRG or a function modeled as an efficiently invertible random permutation.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.