Understanding SSL Protocol and Its Cryptographic Weaknesses

Aditya Aayush, Yash Aryan, Balachandra Muniyal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

SSL certificates (Secure Sockets Layer) have become a core part of website security. They ensure the websites can transfer data to the origin server securely and privately by enabling SSL/TLS encryption. These certificates encrypt all interactions using the website's public key and decode them using the certificate's private key, which is kept on the server that issued the certificate. In addition to encryption, these certificates also help verify website identity and ensure that the user communicates with the correct server. This paper briefly mentions client-server interaction based on HTTP protocol. It gives a detailed explanation of the design and implementation of the Secure Socket Layer protocol, followed by a discussion on the cryptographic vulnerabilities associated with SSL and possible ways to tackle them.

Original languageEnglish
Title of host publicationProceedings of 3rd International Conference on Intelligent Engineering and Management, ICIEM 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages825-832
Number of pages8
ISBN (Electronic)9781665467568
DOIs
Publication statusPublished - 2022
Event3rd International Conference on Intelligent Engineering and Management, ICIEM 2022 - London, United Kingdom
Duration: 27-04-202229-04-2022

Publication series

NameProceedings of 3rd International Conference on Intelligent Engineering and Management, ICIEM 2022

Conference

Conference3rd International Conference on Intelligent Engineering and Management, ICIEM 2022
Country/TerritoryUnited Kingdom
CityLondon
Period27-04-2229-04-22

All Science Journal Classification (ASJC) codes

  • Management of Technology and Innovation
  • Artificial Intelligence
  • Computer Science Applications
  • Information Systems and Management
  • Engineering (miscellaneous)
  • Health Informatics

Fingerprint

Dive into the research topics of 'Understanding SSL Protocol and Its Cryptographic Weaknesses'. Together they form a unique fingerprint.

Cite this