transport layer security

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 4287 Experts worldwide ranked by ideXlab platform

Eric Rescorla - One of the best experts on this subject based on the ideXlab platform.

  • unknown key share attacks on uses of tls with the session description protocol sdp
    RFC, 2021
    Co-Authors: Martin Thomson, Eric Rescorla
    Abstract:

    This document describes unknown key-share attacks on the use of Datagram transport layer security for the Secure Real-Time transport Protocol (DTLS-SRTP). Similar attacks are described on the use of DTLS-SRTP with the identity bindings used in Web Real-Time Communications (WebRTC) and SIP identity. These attacks are difficult to mount, but they cause a victim to be mislead about the identity of a communicating peer. Mitigation techniques are defined that implementations of RFC 8122 are encouraged to deploy.

  • The Datagram transport layer security (DTLS) Protocol Version 1.3
    2020
    Co-Authors: Eric Rescorla, H. (arm Limited) Tschofenig, Nagendra Modadugu
    Abstract:

    This document specifies Version 1.3 of the Datagram transport layer security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. The DTLS 1.3 protocol is intentionally based on the transport layer security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection/non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.

  • the transport layer security tls protocol version 1 3
    RFC, 2018
    Co-Authors: Eric Rescorla
    Abstract:

    This document specifies version 1.3 of the transport layer security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. This document updates RFCs 4492, 5705, and 6066 and it obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.

  • the datagram transport layer security dtls connection identifier
    2017
    Co-Authors: Thomas Fossati, Eric Rescorla, Tobias Gondrom, H. (arm Limited) Tschofenig
    Abstract:

    This document specifies the "Connection ID" concept for the Datagram transport layer security (DTLS) protocol, version 1.2 and version 1.3. A Connection ID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session then the receiver will be unable to locate the correct security context.

  • unknown key share attacks on uses of transport layer security with the session description protocol sdp
    2017
    Co-Authors: Martin Thomson, Eric Rescorla
    Abstract:

    Unknown key-share attacks on the use of Datagram transport layer security for the Secure Real-Time transport Protocol (DTLS-SRTP) and its use with Web Real-Time Communications (WebRTC) identity assertions are described. Simple mitigation techniques are defined.

Joseph Salowey - One of the best experts on this subject based on the ideXlab platform.

Peter Saintandre - One of the best experts on this subject based on the ideXlab platform.

Michael Tuexen - One of the best experts on this subject based on the ideXlab platform.

Wang Tongyang - One of the best experts on this subject based on the ideXlab platform.

  • secure and efficient wtls handshake protocol
    Journal of Computer Applications, 2008
    Co-Authors: Wang Tongyang
    Abstract:

    The primary goal of Wireless transport layer security(WTLS) is to provide the security of the wireless communication.An efficient WTLS handshake protocol would speed up establishing the session between the client and the server,and at the same time reduce the spending of resource on the mobile.A new WTLS handshake protocol called Light online compute WTLS(L-WTLS) was proposed.L-WTLS was much more economic since it had less computation,especially the online ones.At last,that the L-WTLS is more suitable for the low power mobile terminal is proved.