Abstract

The Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) which in now deprecated by the Internet Engineering Task Force are cryptographic protocols that provide communications security over a computer network. Variations of these protocols are used to secure different types of applications such as, email, web browsing, and communication between websites and servers. Currently, TLS is considered the most secure method for protecting web applications. However, there were several cases where hackers managed to penetrate these “secure” applications [1]. The main vulnerabilities lie to the TLS itself, as well as to the Certificate Authorities (CAs).

Published in: Internet Technology and Secured Transactions (ICITST-2018)

  • Date of Conference: 10-13 December 2018
  • DOI: 10.2053/ICITST.WorldCIS.WCST.WCICSS.2018.0017
  • ISBN: 978-1-908320-94-0
  • Conference Location: University of Cambridge, Churchill College