scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters
Journal ArticleDOI

Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism

TL;DR: This work constructs a Module-LWE-based key exchange protocol using Peikert’s error reconciliation mechanism and reduces the total communication cost by 3.2% and slightly reduces the probability of session key agreement failure and the time consumed by modular multiplication of numbers and ring elements by approximately 30%.
Journal ArticleDOI

A survey of methods for encrypted network traffic fingerprinting.

TL;DR: In this paper , the authors investigate and analyze the Transport Layer Security (TLS) fingerprinting technique, a technology that can analyze and classify encrypted traffic without decryption while addressing the problems of existing network fingerprinting techniques.
Journal ArticleDOI

A survey and analysis of TLS interception mechanisms and motivations

TL;DR: TLS is an end-to-end protocol designed to provide confidentiality and integrity guarantees that improve end-user security and privacy as mentioned in this paper , but it also hinders several common beneficial operations typically performed by middleboxes on the network traffic.
Book ChapterDOI

Inferring Exact Domains to Efficiently Generate Valid Test Cases via Testing

TL;DR: In this article , an approach for inferring exact domains, namely IED, is put forward, which starts from crawling parameters' data types from online official documents and conducts exception testing to find tight domains based on slack domains of data types.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.