Analysis of the SSL 3

نویسندگان

  • David Wagner
  • Bruce Schneier
چکیده

The SSL protocol is intended to provide a practical , application-layer, widely applicable connection-oriented mechanism for Internet client/server communications security. This note gives a detailed technical analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol and several new active attacks on SSL are presented; however, these can be easily corrected without overhauling the basic structure of the protocol. We conclude that, while there are still a few technical wrinkles to iron out, on the whole SSL 3.0 is a valuable contribution towards practical communications security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

تأثیر روغن قنادی و نامیزه‌کننده (SSL) بر بیاتی نان بربری

Effect of semihydrogenated vegetable oil (shortening) and sodium stearoyl lactylate (SSL) on retarding Barbari bread staling was investigated in this study. Three levels of 2, 3 and 4 percent shortening and SSL in two levels of 0.5 and 1 percent of flour were used in this research. Treatments included control sample (without shortening and SSL), bread with only shortening, bread with only SSL, ...

متن کامل

تأثیر روغن قنادی و نامیزه‌کننده (SSL) بر بیاتی نان بربری

Effect of semihydrogenated vegetable oil (shortening) and sodium stearoyl lactylate (SSL) on retarding Barbari bread staling was investigated in this study. Three levels of 2, 3 and 4 percent shortening and SSL in two levels of 0.5 and 1 percent of flour were used in this research. Treatments included control sample (without shortening and SSL), bread with only shortening, bread with only SSL, ...

متن کامل

Design and Implementation of an SSL Component Based on CBD

SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerable burden to the CPU utilization so that performance and speed of the security service is lowered during encryption transaction. Second, SSL protocol can be vulnerable for cryptanalysis due to the fixed algorithm being used. Thi...

متن کامل

Finite - State Analysis of SSL 3

The Secure Sockets Layer (SSL) protocol is analyzed using a nite-state enumeration tool called Mur'. The analysis is presented using a sequence of incremental approximations to the SSL 3.0 handshake protocol. Each simpliied protocol is \model-checked" using Mur', with the next protocol in the sequence obtained by correcting errors that Mur' nds automatically. This process identiies the main sho...

متن کامل

Indoor Positioning and Pre-processing of RSS Measurements

Rapid expansions of new location-based services signify the need for finding accurate localization techniques for indoor environments. Among different techniques, RSS-based  schemes and in particular oneof its variants which is based on Graph-based Semi-Supervised Learning (G-SSL) are widely-used approaches The superiority of this scheme is that it has low setup/training cost and at the same ti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996