A Comprehensive Survey on SSL/ TLS and their Vulnerabilities

@article{Satapathy2016ACS,
  title={A Comprehensive Survey on SSL/ TLS and their Vulnerabilities},
  author={Ashutosh Satapathy and L. M. J. Livingston},
  journal={International Journal of Computer Applications},
  year={2016},
  volume={153},
  pages={31-38}
}
The boom of internet, web technologies bring the whole world under a single roof. Transferring information through e-ways leads security to be an important aspect to deal with. In IP network, SSL/ TLS is the protocol works on the top of the transport layer to secure application traffic and provides end to end secure communication. A security hole in those protocols makes the communication channel vulnerable to be eavesdropped and modified information later. This paper discuses SSL and TLS… Expand

References

SHOWING 1-10 OF 26 REFERENCES
Bar Mitzvah Attack
  • 2015
Padding oracle attacks: In depth. Retrieved July 10, 2015, from https://blog.skullsecurity.org/2013/ padding-oracleattacks-in-depth International Journal of Computer Applications
  • Volume
  • 2016
Bar Mitzvah Attack
  • How POODLE Happened
  • 2014
SSL/ TLS Alert Protocol and the Alert Codes
  • Retrieved October
  • 2014
Taming the B
  • 2014
Taming the B.E.A.S.T. - owasp.org
  • Retrieved October
  • 2014
Alert Protocol and the Alert Codes
  • Attack on SSL: A Comprehensive study of BEAST, CRIME, TIME, BREACH, LUCKY 13 and RC4 BIASES
  • 2013
...
1
2
3
...