Search
Search Results
-
Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics
Widely used asymmetric primitives such as RSA or Elliptic Curve Diffie Hellman (ECDH), which enable authentication and key exchange, could be broken... -
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication
OPAQUE is an Asymmetric Password-Authenticated Key Exchange (aPAKE) protocol being standardized by the IETF (Internet Engineering Task Force) as a... -
Transport Layer Security 1.3
TLS 1.3 presents an interesting challenge to CISOs. On the one hand, its use of Perfect Forward Secrecy (PFS) improves the data-in-transit security... -
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
We analyze the handshake protocol of the Transport Layer Security (TLS) protocol, version 1.3. We address both the full TLS 1.3 handshake (the one...
-
On the Concrete Security of TLS 1.3 PSK Mode
The pre-shared key (PSK) handshake modes of TLS 1.3 allow for the performant, low-latency resumption of previous connections and are widely used on... -
Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography
Transport layer security (TLS) is by far the most important protocol on the Internet for establishing secure session keys and providing... -
Security
In this chapter, you will learn about the security features in the Enterprise Edition. One of the most crucial security features in Docker and... -
A Short History of TLS
This chapter describes the differences between the older version of TLS to our reference TLS 1.2, even if they are marked as obsolete. Attacks like... -
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
Secure channel establishment protocols such as Transport Layer Security (TLS) are some of the most important cryptographic protocols, enabling the...
-
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring
More and more Internet traffic is encrypted. While this protects the confidentiality and integrity of communication, it prevents network monitoring... -
Securing APIs with Transport Layer Security (TLS)
Securing APIs with Transport Layer Security (TLS) is the most common form of protection we see in any API deployment. If you are new to TLS, please... -
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study
Built on top of UDP, the recently standardized QUIC protocol primarily aims to gradually replace the TCP plus TLS plus HTTP/2 model. For instance,...
-
QUIC – UDP-Based Multiplexed and Secure Transport
Die Initiative für die Entwicklung von QUIC ging von Google aus. Das Unternehmen entwickelte im Jahr 2012 das Protokoll mit der Bezeichnung „Quick... -
Rest security framework for event streaming bus architecture
Businesses are confronted with a massive influx of real-time data originating from various sources such as application logs, website clickstreams,...
-
Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the Wild
The Transport Layer Security (TLS) protocol was introduced to solve the lack of security and privacy in the early versions of the world wide web.... -
POSTER: Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Efficiency of MQTT
Message Queue Telemetry Transport (MQTT) is one of the most popular Internet of Things (IoT) communication protocols. The MQTT standards suggest the... -
Attacks on SSL and TLS
Many attacks on TLS have been published exploiting vulnerabilities in implementations or the specification. These attacks target different data sets... -
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems
Transport Layer Security (TLS) constitutes one of the most widely used protocols for securing Internet communications and has also found broad... -
Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT Nodes
Security is one of the biggest challenges, particularly in the Industrial IoT and in critical infrastructures. Complex cryptographic computations are... -
IoT Network Layer Security
In the three-layer IoT architecture, the network layer means wide area networks (WANs). This chapter describes some common security techniques of IoT...