Academic literature on the topic 'Cipher suites'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cipher suites.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cipher suites"
Lara, Evangelina, Leocundo Aguilar, Jesús García, and Mauricio Sanchez. "A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices." Sensors 18, no. 10 (October 4, 2018): 3326. http://dx.doi.org/10.3390/s18103326.
Full textFan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.
Full textAlamer, Ahmed, Ben Soh, and David E. Brumbaugh. "MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT." Symmetry 12, no. 1 (December 22, 2019): 32. http://dx.doi.org/10.3390/sym12010032.
Full textArunkumar, B., and G. Kousalya. "Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS." Computer Systems Science and Engineering 40, no. 1 (2022): 179–90. http://dx.doi.org/10.32604/csse.2022.018166.
Full textFadhli, Muhamad, Fityan Ali Munshi, and Taufik Adi Wicaksono. "Ancaman Keamanan pada Transport Layer Security." Jurnal ULTIMA Computing 7, no. 2 (August 1, 2016): 70–75. http://dx.doi.org/10.31937/sk.v7i2.234.
Full textArunkumar, B., and G. Kousalya. "Nonce reuse/misuse resistance authentication encryption schemes for modern TLS cipher suites and QUIC based web servers." Journal of Intelligent & Fuzzy Systems 38, no. 5 (May 29, 2020): 6483–93. http://dx.doi.org/10.3233/jifs-179729.
Full textSuárez-Albela, Manuel, Paula Fraga-Lamas, Luis Castedo, and Tiago Fernández-Caramés. "Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices." Sensors 19, no. 1 (December 20, 2018): 15. http://dx.doi.org/10.3390/s19010015.
Full textYerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (March 15, 2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.
Full textSuárez-Albela, Manuel, Paula Fraga-Lamas, and Tiago Fernández-Caramés. "A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices." Sensors 18, no. 11 (November 10, 2018): 3868. http://dx.doi.org/10.3390/s18113868.
Full textHieu, Minh Nguyen, Duy Ho Ngoc, Canh Hoang Ngoc, Trung Dinh Phuong, and Manh Tran Cong. "New primitives of controlled elements F2/4 for block ciphers." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (October 1, 2020): 5470. http://dx.doi.org/10.11591/ijece.v10i5.pp5470-5478.
Full textDissertations / Theses on the topic "Cipher suites"
Kjell, Edvin, and Sebastian Frisenfelt. "Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177184.
Full textScola, Carlo Alberto. "Valutazione della sicurezza delle comunicazioni con i principali istituti di credito online." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14741/.
Full textVignudelli, Andrea. "Filtraggio e censura dei servizi Internet Un'analisi sul protocollo SSL/TLS." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13204/.
Full textWidyopratomo, Daniel Adrianto, and 魏丹尼. "Analysis of Security Protocols and Corresponding Cipher Suites Recommended in ETSI M2M Standards." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/93038423754970301425.
Full text國立交通大學
電機資訊國際學程
103
Security is one of the fundamental aspects one needs to carefully design and implement for IoT systems. Fortunately, ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT system including the corresponding security protocols that we can utilize. For TLS protocols, ETSI also suggests a set of cipher suite algorithms. Those options are categorized into two types, access-dependent and access-independent, based on the relationship between the M2M Service Provider and the Access Network Provider. According to this categorization, ETSI allows the M2M Service Provider to select the one that is the most suitable for their M2M applications. The standards do not describe in what condition a particular protocol will be the best among the others. Although M2M Service Providers can easily choose one out of many options, it is most ideal if some analytic methods can be defined for selecting a protocol that is the most secure and the least resource demanding one according to the characteristics and the traffic patterns of IoT applications. In this research we examine which conditions are most suitable for a security protocol and a cipher suite algorithm. We focus only on access-independent protocols which do not require any relationship between the M2M Service Provider and the Access Network Provider, because these protocols are most applicable in the industry. Also, the whole end-to-end system can be simulated easily by assuming no support from access networks. In TS 102 690, ETSI defines three levels of security mechanisms: Service Bootstrapping, Connection, and mId security. • M2M Service Bootstrapping mechanism aims to mutually authenticate the M2M Service Provider and the M2M Device or Gateway. EAP-IBAKE over EAP/PANA, EAP-TLS over EAP/PANA and TLS over TCP will be analyzed with regard to this study. The result of M2M Service Bootstrapping is an M2M Root Key (Kmr). • M2M Connection mechanism uses the M2M Root Key to set up a secure data session between a Network M2M Node and an M2M Device / Gateway. EAP-GPSK over EAP/PANA and TLS-PSK are the objects to be analyzed. This mechanism generates M2M Connection Key (Kmc) which will be used for the last mechanism, mId security. • The mId security protects the data transmission over the mId interface. Although there are three ways to secure the interface: access network layer security, channel security, and object security, we will focus on the channel security in our study. To proceed with our analysis, we develop these security mechanisms on top of the OpenMTC platform, which is an ETSI-M2M-compliant system. We use people management system in a factory as the use case for our testing samples, in particular, testing the situation where a large amount of small data traffic is generated in a very short time. Based on the result, we analyze what is the most suitable protocol for the type of traffic pattern in this use case. Several parameters can be utilized to determine the most suitable protocol, such as efficiency, cost, and effectiveness. In order to measure efficiency, we record the processing time, CPU usage, and memory usage. To measure the cost, we use the number of sent and received messages, including their total sizes, as the parameters for comparison. For the effectiveness of a particular protocol, we use the degree of security guarantee from a protocol / cipher suite such as very strong, strong, average, weak, or very weak.
Book chapters on the topic "Cipher suites"
Arunkumar, B., and G. Kousalya. "Analysis of AES-GCM Cipher Suites in TLS." In Advances in Intelligent Systems and Computing, 102–11. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68385-0_9.
Full textMoura, Ricardo, David R. Matos, Miguel L. Pardal, and Miguel Correia. "MultiTLS: Secure Communication Channels with Cipher Suite Diversity." In ICT Systems Security and Privacy Protection, 64–77. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2_5.
Full textPoupard, Guillaume, and Serge Vaudenay. "Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications." In Lecture Notes in Computer Science, 254–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10721064_24.
Full textPrinz, Stefan, Silvie Schmidt, Manuel Koschuch, Alexander Glaser, Taro Fruhwirth, and Matthias Hudler. "What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility." In E-Business and Telecommunications, 58–78. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30222-5_3.
Full textRenner, Sebastian, Enrico Pozzobon, and Jürgen Mottok. "A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers." In Information and Communications Security, 495–509. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61078-4_28.
Full textBryan, Simms. "Secret Programs with Twelve Tones, 1925–27." In Berg, 255–88. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190931445.003.0008.
Full textBudiansky, Stephen. "Colossus, Codebreaking, and the Digital Age." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0011.
Full textSmith, Michael. "How It Began: Bletchley Park Goes to War." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0009.
Full textConference papers on the topic "Cipher suites"
Albrecht, Martin R., Jean Paul Degabriele, Torben Brandt Hansen, and Kenneth G. Paterson. "A Surfeit of SSH Cipher Suites." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2976749.2978364.
Full textSimos, Dimitris E., Kristoffer Kleine, Artemios G. Voyiatzis, Rick Kuhn, and Raghu Kacker. "TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach." In 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2016. http://dx.doi.org/10.1109/qrs.2016.18.
Full textKoschuch, Manuel, Taro Fruhwirth, Alexander Glaser, Silvie Schmidt, and Matthias Hudler. "Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility." In International Conference on Data Communication Networking. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005507900130023.
Full textAdrianto, Daniel, and Fuchun Joseph Lin. "Analysis of security protocols and corresponding cipher suites in ETSI M2M standards." In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389152.
Full textYesiltepe, Mirsat, Gulsah Kose, and Sinem Karadeniz. "Protocols of cipher suite." In 2016 Elektrik-Elektronik, Bilgisayer, Biyomedikal Muhendislikleri Bilimsel Toplantisi (EBBT) [2016 Electrical, Electronic, Computer and Biomedical Engineering Meeting (EBBT)]. IEEE, 2016. http://dx.doi.org/10.1109/ebbt.2016.7483684.
Full textNarayanan, Renuka, S. Jayashree, Nisha Deborah Philips, A. M. Saranya, Sahaya Beni Prathiba, and Gunasekaran Raja. "TLS Cipher Suite: Secure Communication of 6LoWPAN Devices." In 2019 11th International Conference on Advanced Computing (ICoAC). IEEE, 2019. http://dx.doi.org/10.1109/icoac48765.2019.246840.
Full textLee, Yoonyoung, Soonhaeng Hur, Dongho Won, and Seungjoo Kim. "Cipher Suite Setting Problem of SSL Protocol and it's Solutions." In 2009 International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2009. http://dx.doi.org/10.1109/waina.2009.76.
Full textFrost, Vanessa, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, and Kevin R. B. Butler. "Examining DES-based Cipher Suite Support within the TLS Ecosystem." In Asia CCS '19: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3321705.3329858.
Full textBerthier, Paul-Edmond, Stephane Cauchie, and Zonghua Zhang. "Secure PUFs-Based Cipher Suite for Enabling TLS to Authenticate Hardware Devices." In ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2714576.2714652.
Full textReports on the topic "Cipher suites"
Popov, A. Prohibiting RC4 Cipher Suites. RFC Editor, February 2015. http://dx.doi.org/10.17487/rfc7465.
Full textKato, A., M. Kanda, and S. Kanno. Camellia Cipher Suites for TLS. RFC Editor, June 2010. http://dx.doi.org/10.17487/rfc5932.
Full textYang, P. ShangMi (SM) Cipher Suites for TLS 1.3. RFC Editor, March 2021. http://dx.doi.org/10.17487/rfc8998.
Full textBadra, M., and I. Hajjeh. ECDHE_PSK Cipher Suites for Transport Layer Security (TLS). RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5489.
Full textMcGrew, D., and D. Bailey. AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC Editor, July 2012. http://dx.doi.org/10.17487/rfc6655.
Full textSalowey, J., A. Choudhury, and D. McGrew. AES Galois Counter Mode (GCM) Cipher Suites for TLS. RFC Editor, August 2008. http://dx.doi.org/10.17487/rfc5288.
Full textLangley, A., W. Chang, N. Mavrogiannopoulos, J. Strombergson, and S. Josefsson. ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS). RFC Editor, June 2016. http://dx.doi.org/10.17487/rfc7905.
Full textEronen, P., ed. DES and IDEA Cipher Suites for Transport Layer Security (TLS). RFC Editor, February 2009. http://dx.doi.org/10.17487/rfc5469.
Full textMoriai, S., A. Kato, and M. Kanda. Addition of Camellia Cipher Suites to Transport Layer Security (TLS). RFC Editor, July 2005. http://dx.doi.org/10.17487/rfc4132.
Full textLee, H. J., J. H. Yoon, and J. I. Lee. Addition of SEED Cipher Suites to Transport Layer Security (TLS). RFC Editor, August 2005. http://dx.doi.org/10.17487/rfc4162.
Full text