Skip to content
Attacks on the TLS Record Protocol and IT Certification Exams
  • Contact Us
Close Menu

Triple Handshake attack 2 – Attacks on the TLS Handshake ProtocolTriple Handshake attack 2 – Attacks on the TLS Handshake Protocol

09/02/202409/02/2024| Vera NeelTriple Handshake attack 2 – Attacks on the TLS Handshake Protocol| 0 Comment| 03:40

Before the third handshake, server Alice has to require a session renegotiation, including client authentication, on its connection with Mallory, possibly in response to Mallory’s request for some restricted resource. [...]

Read MoreRead More

Triple Handshake attack – Attacks on the TLS Handshake ProtocolTriple Handshake attack – Attacks on the TLS Handshake Protocol

09/02/202409/02/2024| Vera NeelTriple Handshake attack – Attacks on the TLS Handshake Protocol| 0 Comment| 03:39

20.8 Triple Handshake attack In the Triple Handshake attack [29], an attacker posing as a man-in-the-middle causes two separate TLS connections, namely one from client Bob to attacker Mallory and [...]

Read MoreRead More

Lucky 13 – Attacks on the TLS Record ProtocolLucky 13 – Attacks on the TLS Record Protocol

04/05/202404/05/2024| Vera NeelLucky 13 – Attacks on the TLS Record Protocol| 0 Comment| 03:43

21.1 Lucky 13 In 2013, Nadhem AlFardan and Kenneth Paterson, two researchers from the Information Security Group at Royal Holloway, University of London, published a new attack that can recover [...]

Read MoreRead More

The timing signal – Attacks on the TLS Record ProtocolThe timing signal – Attacks on the TLS Record Protocol

02/05/202402/05/2024| Vera NeelThe timing signal – Attacks on the TLS Record Protocol| 0 Comment| 03:49

21.1.2 The timing signal You may be wondering where the timing signal originates from in the encryption process illustrated in Figure 21.1. That source, it turns out, is the HMAC [...]

Read MoreRead More

POODLE – Attacks on the TLS Record ProtocolPOODLE – Attacks on the TLS Record Protocol

12/12/202312/12/2023| Vera NeelPOODLE – Attacks on the TLS Record Protocol| 0 Comment| 03:51

21.2 POODLE POODLE stands for Padding Oracle On Downgraded Legacy Encryption and was discovered in 2014 by Möller, Duong, and Kotowicz [122]. The name shows that the attack combines two [...]

Read MoreRead More

BEAST – Attacks on the TLS Record ProtocolBEAST – Attacks on the TLS Record Protocol

10/02/202310/02/2023| Vera NeelBEAST – Attacks on the TLS Record Protocol| 0 Comment| 03:52

21.3 BEAST Browser Exploit Against SSL/TLS (BEAST) [55] is an attack on the CBC-based encryption of the record layer in SSL 3.0 and TLS 1.0. It is not a padding [...]

Read MoreRead More

Sweet32 – Attacks on the TLS Record ProtocolSweet32 – Attacks on the TLS Record Protocol

08/08/202308/08/2023| Vera NeelSweet32 – Attacks on the TLS Record Protocol| 0 Comment| 03:54

21.4 Sweet32 SWEET32 [30] is a generic attack against block ciphers with a block size of 64 bits in CBC mode, such as DES or 3DES. However, it has special [...]

Read MoreRead More

Lossless compression algorithms – Attacks on the TLS Record ProtocolLossless compression algorithms – Attacks on the TLS Record Protocol

06/10/202306/10/2023| Vera NeelLossless compression algorithms – Attacks on the TLS Record Protocol| 0 Comment| 03:55

21.5.1 Lossless compression algorithms In a lossless compression algorithm, the input data is encoded in such a way that its length is decreased. After decoding, however, all of the input [...]

Read MoreRead More

The compression side channel – Attacks on the TLS Record ProtocolThe compression side channel – Attacks on the TLS Record Protocol

04/05/202304/05/2023| Vera NeelThe compression side channel – Attacks on the TLS Record Protocol| 0 Comment| 03:56

21.5.2 The compression side channel Back in 2002, John Kelsey, a cryptographer working for Certicom at that time, published a paper [98] describing how lossless data compression, when used in [...]

Read MoreRead More

Brief history of compression in TLS – Attacks on the TLS Record ProtocolBrief history of compression in TLS – Attacks on the TLS Record Protocol

02/02/202302/02/2023| Vera NeelBrief history of compression in TLS – Attacks on the TLS Record Protocol| 0 Comment| 03:57

21.5.3 Brief history of compression in TLS Both TLS version 1.0 released in 1999 [47] and TLS version 1.1 released in 2006 [48] specify compression for TLS records. One of [...]

Read MoreRead More

Posts pagination

1 2 3 Next

Search

Dropdown Categories

Archives

  • September 2024
  • April 2024
  • February 2024
  • December 2023
  • October 2023
  • August 2023
  • June 2023
  • April 2023
  • February 2023
  • November 2022
  • September 2022
  • July 2022
  • May 2022
  • March 2022
  • January 2022
  • November 2021
  • October 2021
  • August 2021
  • July 2021
  • May 2021
  • March 2021
  • January 2021

Meta

  • Log in

Tag Cloud

Back to Top
Privacy Policy | Cookie Policy | Cookies Settings | Terms & Conditions | Accessibility | Legal Notice