What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS
A number of important real-world protocols including the Transport Layer Security (TLS) protocol have the ability to negotiate various security-related choices such as the protocol version and the cryptographic algorithms to be used in a particular session. Furthermore, some insecure application-lay...
Main Authors: | Alashwali, ES, Rasmussen, K |
---|---|
Format: | Conference item |
Published: |
Springer International Publishing
2018
|
Similar Items
-
On downgrade attacks in the TLS protocol
by: Alashwali, E
Published: (2016) -
CDT mini-project-2 research proposal: on downgrade attacks in TLS protocol
by: Alashwali, E
Published: (2016) -
Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
by: Pathangi Janardhanan Jatinshravan
Published: (2017) -
Demonstration of attacks on SSL-TLS protocols
by: Iyer Rajagopal Mahadevan
Published: (2022) -
Key negotiation downgrade attacks on bluetooth and bluetooth low energy
by: Antonioli, D, et al.
Published: (2020)