Summarizing Current Attacks on TLS and DTLS
draft-sheffer-uta-tls-attacks-00
Document | Type |
Replaced Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Yaron Sheffer , Ralph Holz , Peter Saint-Andre | ||
Last updated | 2014-03-27 (Latest revision 2014-02-07) | ||
Replaced by | draft-ietf-uta-tls-attacks | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Replaced by draft-ietf-uta-tls-attacks | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Over the last few years there have been several serious attacks on TLS, including attacks on its most commonly used ciphers and modes of operation. This document summarizes these attacks, with the goal of motivating generic and protocol-specific recommendations on the usage of TLS and DTLS.
Authors
Yaron Sheffer
Ralph Holz
Peter Saint-Andre
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)