Employing public key infrastructure to encapsulate messages during transport layer security handshake procedure

NA Khan, AS Khan, HA Kar, Z Ahmad… - 2022 Applied …, 2022 - ieeexplore.ieee.org
The Transport Layer ensures that data is sent transparently between end-users while also
enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure …

Comparison studies between pre-shared and public key exchange mechanisms for transport layer security

FC Kuo, H Tschofenig, F Meyer… - … IEEE INFOCOM 2006 …, 2006 - ieeexplore.ieee.org
The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently
standardized by the IETF to extend the set of ciphersuites by utilizing existing key …

Key-exchange authentication using shared secrets

M Badra, I Hajjeh - Computer, 2006 - ieeexplore.ieee.org
Transport Layer Security standard provides connection security with peer entity
authentication, data confidentiality and integrity, key generation and distribution, and …

Extending TLS with KMIP protocol for cloud computing

M Msahli, A Serhrouchni… - 2016 8th IFIP International …, 2016 - ieeexplore.ieee.org
Any information system using encryption tends to have its own key management
infrastructure. In practice, we find a separate key management systems dedicated to …

Securing web documents by using piggybacked framework based on Newton's forward interpolation method

J Arora, KR Ramkumar, R Sathiyaraj… - Journal of Information …, 2023 - Elsevier
The modern telecommunication system that transfers data over the web requires a secure
channel so that integrity, authentication, and confidentiality of data are ensured. To achieve …

[PDF][PDF] Comparison studies between pre-shared key and public key exchange mechanisms for transport layer security (TLS)

FC Kuo, H Tschofenig, F Meyer… - Institute for Informatics …, 2006 - researchgate.net
The security is an important issue for data communication over Internet. In recent years, with
the rising threats of data tampering and data interruption, security is becoming an important …

Ssl/tls attacks: Analysis and evaluation

AEW Eldewahi, TMH Sharfi, AA Mansor… - 2015 International …, 2015 - ieeexplore.ieee.org
The Secure Socket Layer/Transport Layer Security (SSL/TLS) provides data confidentiality,
integrity and authenticity between two communicating applications. There are many attacks …

Key confirmation in key exchange: A formal treatment and implications for TLS 1.3

M Fischlin, F Günther, B Schmidt… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
Key exchange protocols allow two parties at remote locations to compute a shared secret
key. The common security notions for such protocols are secrecy and authenticity, but many …

Taxonomy of SSL/TLS attacks

VK Keerthi - International Journal of Computer Network and …, 2016 - search.proquest.com
Abstract Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols use
cryptographic algorithms to secure data and ensure security goals such as Data …

SoK: Lessons learned from SSL/TLS attacks

C Meyer, J Schwenk - International Workshop on Information Security …, 2013 - Springer
Since its introduction in 1994 the Secure Socket Layer (SSL) protocol (later renamed to
Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport …