2005
DOI: 10.6028/nist.sp.800-52
|View full text |Cite
|
Sign up to set email alerts
|

Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations

Abstract: (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, administrative, and management standards and guidelines for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 2 publications
0
12
0
Order By: Relevance
“…Indeed, the attack described in Section III will work just as before 6 . We next present an attack that recovers the rightmost byte of plaintext in any target block for GnuTLS-style padding processing.…”
Section: F More Challenging Network Environmentsmentioning
confidence: 99%
See 2 more Smart Citations
“…Indeed, the attack described in Section III will work just as before 6 . We next present an attack that recovers the rightmost byte of plaintext in any target block for GnuTLS-style padding processing.…”
Section: F More Challenging Network Environmentsmentioning
confidence: 99%
“…2) P 20 ends with any other byte value: in this case, at least two bytes of "padding" are removed, the next 20 bytes are interpreted as a MAC tag T , and the remaining bytes of plaintext are taken as the record R. Because the starting message length, at 320 bytes, is long enough to allow for the removal of 256 bytes of padding and a 20-byte MAC whilst still leaving 5 www.gnu.org/software/gnutls/ 6 In fact, since the attack only involves plaintexts which are correctly padded, it will work for any correct decryption algorithm. a non-null record, no length sanity tests will fail.…”
Section: F More Challenging Network Environmentsmentioning
confidence: 99%
See 1 more Smart Citation
“… NIST SP 800-52 provides guidance on Transport Layer Security (TLS) Implementations [68]  NIST SP 800-56 provides guidance on cryptographic key establishment [69].…”
Section: System and Communications Protectionmentioning
confidence: 99%
“…In TLS, a rich set of mutual authentication variants, which are based on different so-called ciphersuites, is provided. Assume for simplicity that the five ciphersuites listed in Table I are available (in descending order of security strength according to [10]): …”
Section: A the Ieee 802]]i Standardmentioning
confidence: 99%