-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

TLS Cryptography In-Depth
By :

On the most abstract level, a cryptographic protocol such as TLS can be viewed as a cryptographic system, that is, a system that utilizes cryptographic techniques to achieve certain protection goals.
In the present chapter, we will discuss various types of cryptographic attacks. However, we will not consider malware-based attacks (see https://en.wikipedia.org/wiki/Category:Cryptographic_attacks for a list of various attacks) on end systems where cryptographic algorithms are carried out. The reason for this is that we are mainly interested in the security of cryptographic algorithms, but not in the security of the computing platforms they are running on.
Basically, this means the security of cryptographic systems is evaluated based on the assumption that two important conditions are fulfilled:
There is some kind of secret – maybe shared, as in symmetric key cryptography, or maybe private, as in Diffie-Hellman key exchange – that is unknown to the...
Change the font size
Change margin width
Change background colour