Academic literature on the topic 'Cipher suites'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cipher suites.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cipher suites"

1

Lara, Evangelina, Leocundo Aguilar, Jesús García, and Mauricio Sanchez. "A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices." Sensors 18, no. 10 (2018): 3326. http://dx.doi.org/10.3390/s18103326.

Full text
Abstract:
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context. Even though IoT has many advantages, its characteristics make it very vulnerable to security attacks. Ciphers are a security primitive that can prevent some of the attacks; however, the constrained computing and energy resources of IoT devices impede them from implementing current ciphers. This article presents the stream cipher Generador de Bits Pseudo Aleatorios (GBPA) based on Salsa20 cipher, which i
APA, Harvard, Vancouver, ISO, and other styles
2

Kolegov, D. N., and Y. R. Khalniyazova. "WireGuard protocol with gost cipher suites." Prikladnaya diskretnaya matematika. Prilozhenie, no. 14 (September 1, 2021): 81–84. http://dx.doi.org/10.17223/2226308x/14/18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.

Full text
Abstract:
The fourth generation of mobile telecommunications system (marketed as 4G-LTE) is being commercially and widely deployed. Security mechanisms are crucial to protect communications of mobile users from potential malicious attacks as well as to ensure revenue for 4G-LTE network operators. The randomness properties of the keystream generated by the current cipher suites in 4G-LTE standard are difficult to analyze and some vulnerabilities with regard to the integrity algorithms have been recently discovered. To address those issues, we present a detailed specification and security analysis of a bi
APA, Harvard, Vancouver, ISO, and other styles
4

Serrano, Ronaldo, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham, and Trong-Thuc Hoang. "ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3." Cryptography 6, no. 2 (2022): 30. http://dx.doi.org/10.3390/cryptography6020030.

Full text
Abstract:
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advanced Encryption Standard (AES). However, the few implementations cannot provide sufficient speed compared to other encryption standards with Authenticated Encryption with Associated Data (AEAD). This paper shows ChaCha20 and Poly1305 primitives. In addition, a compatible ChaCha20–Poly1305 AEAD with TLS 1.3 is implemented with a fault detector to reduce th
APA, Harvard, Vancouver, ISO, and other styles
5

Mashael, Alsaleh, and Aldossary Abdullah. "Cryptographic Key Generation for Logically Shared Data Stores." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 58–59. https://doi.org/10.5281/zenodo.8185969.

Full text
Abstract:
<strong>Abstract:</strong> This research explains a method of establishing a secure communication between a client and a server using a rotating key mechanism. The method comprises receiving a message requesting communication from a client, returning information for establishing communication to the client, including a set of cipher suites supported, receiving from the client one or more selected cipher suites from the set of cipher suites, sending rotation key mechanism attributes (RKM attributes) including a number of keys for rotation, a valid time period for each key, and a server critical
APA, Harvard, Vancouver, ISO, and other styles
6

Alamer, Ahmed, Ben Soh, and David E. Brumbaugh. "MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT." Symmetry 12, no. 1 (2019): 32. http://dx.doi.org/10.3390/sym12010032.

Full text
Abstract:
Lightweight stream ciphers have attracted significant attention in the last two decades due to their security implementations in small devices with limited hardware. With low-power computation abilities, these devices consume less power, thus reducing costs. New directions in ultra-lightweight cryptosystem design include optimizing lightweight cryptosystems to work with a low number of gate equivalents (GEs); without affecting security, these designs consume less power via scaled-down versions of the Mutual Irregular Clocking KEYstream generator—version 2-(MICKEY 2.0) cipher. This study aims t
APA, Harvard, Vancouver, ISO, and other styles
7

Arunkumar, B., and G. Kousalya. "Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS." Computer Systems Science and Engineering 40, no. 1 (2022): 179–90. http://dx.doi.org/10.32604/csse.2022.018166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Peñarrieta, David, Marlon Navia, Eliana Garcia, and Dannyll Zambrano. "Evaluación de la Seguridad de Certificados Digitales en las Plataformas Financieras de Ecuador." Revista Tecnológica - ESPOL 36, no. 2 (2024): 174–89. https://doi.org/10.37815/rte.v36n2.1222.

Full text
Abstract:
This article presents a diagnosis of the application of digital certificates in the virtual banking services of Ecuador. The importance of this topic is based on the increasing attacks on electronic services of financial platforms in the region and the world, due to the exploitation of vulnerabilities discovered by cybercriminals in the weak application of cipher suites. The objective of the research is to show the level of security of these online banking portals (individuals), in the applicability of SSL/TLS protocols, with their respective cipher suites on the server side. Eighteen financia
APA, Harvard, Vancouver, ISO, and other styles
9

Fadhli, Muhamad, Fityan Ali Munshi, and Taufik Adi Wicaksono. "Ancaman Keamanan pada Transport Layer Security." Jurnal ULTIMA Computing 7, no. 2 (2016): 70–75. http://dx.doi.org/10.31937/sk.v7i2.234.

Full text
Abstract:
Secure Socket Layer (SSL) also known as Transfer Layer Security (TLS) is de facto standard for web security. It provides confidentiality and integrity of information in transit across the public networks using their powerful cipher suites but it still contains some loopholes or flaws in its foundation. In this paper we discuss TLS standard along with various attacks found in recent years, such as BEAST, CRIME, BREACH, Lucky 13, and their proposed mitigation.&#x0D; Index Terms— Attack, Compression, Mitigation, Security, TLS.
APA, Harvard, Vancouver, ISO, and other styles
10

Anelia, Syifa Sabrina, Jayanta Jayanta, and Bayu Hananto. "Uji Penetrasi Server Universitas PQR Menggunakan Metode National Institute Of Standards And Technology (NIST SP 800-115)." Jurnal Ilmu Teknik dan Komputer 7, no. 1 (2023): 34. http://dx.doi.org/10.22441/jitkom.2023.v7i1.005.

Full text
Abstract:
Abstract -- Ancaman keamanan serangan siber terjadi di beberapa universitas. Data penting yang terletak pada server organisasi bisa saja diretas oleh orang yang tidak berhak. Salah satu cara menghindari peretasan adalah menutup celah-celah keamanan yang dimiliki sistem. Sebelum menutup celah keamanan, tentu harus diketahui celah keamanannya, dengan melakukan pengujian seperti yang dilakukan oleh peretas, namun dengan prosedur yang telah disetujui. Pada penelitian ini dilakukan pengujian penetrasi yang bertujuan menguji kerentanan serta menemukan celah keamanan yang ada pada server universitas,
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cipher suites"

1

Kjell, Edvin, and Sebastian Frisenfelt. "Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177184.

Full text
Abstract:
The importance of security on the web is growing every day. How domains handle and prioritize their level of security is varying. Tradeoffs between security and convenience have to be made to uphold a website's public image. This thesis uses a subset of domains from the Alexa Top 1M list. The list was used to create our datasets, collected through active scans with testssl.sh. This thesis has through the mentioned datasets compared domains in regards to several security aspects and analyzed how they handle security and convenience. We performed our scans over the course of two weeks to analyze
APA, Harvard, Vancouver, ISO, and other styles
2

Scola, Carlo Alberto. "Valutazione della sicurezza delle comunicazioni con i principali istituti di credito online." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14741/.

Full text
Abstract:
In questa tesi sono stati studiati in maniera approfondita i protocolli crittografici SSL/TLS mettendone in risalto le potenzialità così come le debolezze in correlazione all'uso con HTTPS. Sono stati studiati gli aspetti relativi ai certificati, all'infrastruttura a chiave pubblica e sono stati riportati vari tipi di attacchi conosciuti alla sicurezza delle comunicazioni. Successivamente, lo scopo del progetto è stato quello di sviluppare un tool per l'analisi passiva delle comunicazioni HTTPS di un sito web. In particolare il tool ha permesso di individuare ed identificare errate con
APA, Harvard, Vancouver, ISO, and other styles
3

Vignudelli, Andrea. "Filtraggio e censura dei servizi Internet Un'analisi sul protocollo SSL/TLS." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13204/.

Full text
Abstract:
Obiettivo ultimo di questa tesi è fornire le competenze necessarie per poter capire come effettuare politiche di filtraggio dei contenuti fruibili su Internet in contesti prevalentemente di network locali come LAN aziendali ma anche su scala maggiore, effettuando politiche di blocco al livello logico 7 della pila protocollare ISO/OSI. Nello specifico verranno approfondite le specifiche tecniche del protocollo SSL/TLS e su queste basi teoriche verranno implementate e testate regole di blocco di specifici servizi Internet simulando il contesto di una piccola rete domestica con un Firewall di fr
APA, Harvard, Vancouver, ISO, and other styles
4

Widyopratomo, Daniel Adrianto, and 魏丹尼. "Analysis of Security Protocols and Corresponding Cipher Suites Recommended in ETSI M2M Standards." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/93038423754970301425.

Full text
Abstract:
碩士<br>國立交通大學<br>電機資訊國際學程<br>103<br>Security is one of the fundamental aspects one needs to carefully design and implement for IoT systems. Fortunately, ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT system including the corresponding security protocols that we can utilize. For TLS protocols, ETSI also suggests a set of cipher suite algorithms. Those options are categorized into two types, access-dependent and access-independent, based on the relationship between the M2M Service Provider and the Access Net
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cipher suites"

1

Arunkumar, B., and G. Kousalya. "Analysis of AES-GCM Cipher Suites in TLS." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68385-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moura, Ricardo, David R. Matos, Miguel L. Pardal, and Miguel Correia. "MultiTLS: Secure Communication Channels with Cipher Suite Diversity." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Poupard, Guillaume, and Serge Vaudenay. "Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10721064_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prinz, Stefan, Silvie Schmidt, Manuel Koschuch, Alexander Glaser, Taro Fruhwirth, and Matthias Hudler. "What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility." In E-Business and Telecommunications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30222-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Renner, Sebastian, Enrico Pozzobon, and Jürgen Mottok. "A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers." In Information and Communications Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61078-4_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shinde, Reena, and Bramah Hazela. "IoT Security Using Lightweight Cipher Suites in Constrained Application Protocols (CoAP)." In Lightweight Cryptographic Algorithms for Secure IoT Devices, 2025th ed. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552302-14.

Full text
Abstract:
The rapid expansion of the Internet of Things (IoT) ecosystem has intensified the need for lightweight, yet robust security mechanisms tailored to constrained environments. This book chapter presents a comprehensive investigation into the integration of lightweight cipher suites within the Constrained Application Protocol (CoAP), focusing on cryptographic performance, interoperability, and deployment-specific trade-offs. Emphasizing both symmetric and asymmetric approaches, it explores the selection, benchmarking, and suitability of modern AEAD and lightweight public-key ciphers for microcontr
APA, Harvard, Vancouver, ISO, and other styles
7

Srinivas, Yallapu, and Akash Dey. "Design and Evaluation of Stream Ciphers in Battery Powered IoT Sensors." In Lightweight Cryptographic Algorithms for Secure IoT Devices, 2025th ed. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552302-03.

Full text
Abstract:
The rapid expansion of the Internet of Things (IoT) ecosystem has intensified the demand for secure and energy-efficient cryptographic solutions tailored for constrained environments such as battery-powered and intermittently powered sensor nodes. This chapter presents a comprehensive study on the design and evaluation of lightweight stream ciphers specifically suited for resourcelimited IoT hardware. Emphasis was placed on the algorithmic foundations, nonlinear function integration, and Boolean combining techniques that enhance cryptographic resilience while maintaining low implementation ove
APA, Harvard, Vancouver, ISO, and other styles
8

Bryan, Simms. "Secret Programs with Twelve Tones, 1925–27." In Berg. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190931445.003.0008.

Full text
Abstract:
Chapter 7 covers the years 1925–27, the period in which Berg first began composing with a version of Schoenberg’s twelve-tone method. His first such work was the song “Schließe mir die Augen beide,” for which he reused the poetic text of an earlier song. Berg continued to apply and to refine his twelve-tone method in the Lyric Suite for string quartet and in all of his later works. The method ultimately became his alone, only remotely resembling that of Schoenberg. Berg also faced a midlife crisis during these years. In 1925 he fell in love with Hanna Fuchs-Robettin, the wife of a Prague indus
APA, Harvard, Vancouver, ISO, and other styles
9

Budiansky, Stephen. "Colossus, Codebreaking, and the Digital Age." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0011.

Full text
Abstract:
The paths that took men and women from their ordinary lives and deposited them on the doorstep of the odd profession of cryptanalysis were always tortuous, accidental, and unpredictable. The full story of the Colossus, the pioneering electronic device developed by the Government Code and Cypher School (GC &amp; CS) to break German teleprinter ciphers in the Second World War, is fundamentally a story of several of these accidental paths converging at a remarkable moment in the history of electronics—and of the wartime urgency that set these men and women on these odd paths. Were it not for the
APA, Harvard, Vancouver, ISO, and other styles
10

Smith, Michael. "How It Began: Bletchley Park Goes to War." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0009.

Full text
Abstract:
The breaking of the German teleprinter cipher that led to the construction of the Colossus computer was the culmination of a series of triumphs for British codebreakers. British interception of other countries’ radio communications had begun in earnest during the First World War. The War Office ‘censored’ diplomatic communications passing through the hands of the international telegraph companies, setting up a codebreaking operation to decipher the secret messages. The British Army intercepted German military wireless communications with a great deal of success. E. W. B. Gill, one of the army
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cipher suites"

1

Albrecht, Martin R., Jean Paul Degabriele, Torben Brandt Hansen, and Kenneth G. Paterson. "A Surfeit of SSH Cipher Suites." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. http://dx.doi.org/10.1145/2976749.2978364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Simos, Dimitris E., Kristoffer Kleine, Artemios G. Voyiatzis, Rick Kuhn, and Raghu Kacker. "TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach." In 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2016. http://dx.doi.org/10.1109/qrs.2016.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Koschuch, Manuel, Taro Fruhwirth, Alexander Glaser, Silvie Schmidt, and Matthias Hudler. "Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility." In International Conference on Data Communication Networking. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005507900130023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Garcia, Daniel, and Hong Liu. "A Study of Post Quantum Cipher Suites for Key Exchange." In 2021 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE, 2021. http://dx.doi.org/10.1109/hst53381.2021.9619839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Adrianto, Daniel, and Fuchun Joseph Lin. "Analysis of security protocols and corresponding cipher suites in ETSI M2M standards." In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Heftrig, Elias, Jean-Pierre Seifert, Haya Shulman, Michael Waidner, and Nils Wisiol. "Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers." In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2021. http://dx.doi.org/10.1145/3460120.3485349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yesiltepe, Mirsat, Gulsah Kose, and Sinem Karadeniz. "Protocols of cipher suite." In 2016 Elektrik-Elektronik, Bilgisayer, Biyomedikal Muhendislikleri Bilimsel Toplantisi (EBBT) [2016 Electrical, Electronic, Computer and Biomedical Engineering Meeting (EBBT)]. IEEE, 2016. http://dx.doi.org/10.1109/ebbt.2016.7483684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Narayanan, Renuka, S. Jayashree, Nisha Deborah Philips, A. M. Saranya, Sahaya Beni Prathiba, and Gunasekaran Raja. "TLS Cipher Suite: Secure Communication of 6LoWPAN Devices." In 2019 11th International Conference on Advanced Computing (ICoAC). IEEE, 2019. http://dx.doi.org/10.1109/icoac48765.2019.246840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Yoonyoung, Soonhaeng Hur, Dongho Won, and Seungjoo Kim. "Cipher Suite Setting Problem of SSL Protocol and it's Solutions." In 2009 International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2009. http://dx.doi.org/10.1109/waina.2009.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Frost, Vanessa, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, and Kevin R. B. Butler. "Examining DES-based Cipher Suite Support within the TLS Ecosystem." In Asia CCS '19: ACM Asia Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3321705.3329858.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cipher suites"

1

Popov, A. Prohibiting RC4 Cipher Suites. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kato, A., M. Kanda, and S. Kanno. Camellia Cipher Suites for TLS. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, P. ShangMi (SM) Cipher Suites for TLS 1.3. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Badra, M., and I. Hajjeh. ECDHE_PSK Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cam-Winget, N., and J. Visoky. TLS 1.3 Authentication and Integrity-Only Cipher Suites. RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lonvick, C., S. Turner, and J. Salowey. Updates to the Cipher Suites in Secure Syslog. RFC Editor, 2024. http://dx.doi.org/10.17487/rfc9662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Salowey, J., A. Choudhury, and D. McGrew. AES Galois Counter Mode (GCM) Cipher Suites for TLS. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

McGrew, D., and D. Bailey. AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Langley, A., W. Chang, N. Mavrogiannopoulos, J. Strombergson, and S. Josefsson. ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Medvinsky, A., and M. Hur. Addition of Kerberos Cipher Suites to Transport Layer Security (TLS). RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!