Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Journal ArticleDOI
Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism
TL;DR: This work constructs a Module-LWE-based key exchange protocol using Peikert’s error reconciliation mechanism and reduces the total communication cost by 3.2% and slightly reduces the probability of session key agreement failure and the time consumed by modular multiplication of numbers and ring elements by approximately 30%.
Journal ArticleDOI
A survey of methods for encrypted network traffic fingerprinting.
Sung-Tae Yu,Yoojae Won +1 more
TL;DR: In this paper , the authors investigate and analyze the Transport Layer Security (TLS) fingerprinting technique, a technology that can analyze and classify encrypted traffic without decryption while addressing the problems of existing network fingerprinting techniques.
Dissertation
Implementation and Simulation of Secure Sockets Layer (SSL) in Windows Presentation Foundation
Journal ArticleDOI
A survey and analysis of TLS interception mechanisms and motivations
TL;DR: TLS is an end-to-end protocol designed to provide confidentiality and integrity guarantees that improve end-user security and privacy as mentioned in this paper , but it also hinders several common beneficial operations typically performed by middleboxes on the network traffic.
Book ChapterDOI
Inferring Exact Domains to Efficiently Generate Valid Test Cases via Testing
TL;DR: In this article , an approach for inferring exact domains, namely IED, is put forward, which starts from crawling parameters' data types from online official documents and conducts exception testing to find tight domains based on slack domains of data types.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.