Skip to the main content

Review article

https://doi.org/10.19279/TVZ.PD.2017-5-1-11

CRYPTOGRAPHY PROTOCOL

Ninoslav Ceglec ; Zagreb University of Applied Sciences, Zagreb, Croatia, Student
Dubravko Žigman orcid id orcid.org/0000-0002-9231-532X ; Zagreb University of Applied Sciences, Zagreb, Croatia


Full text: croatian PDF 907 Kb

page 79-85

downloads: 394

cite


Abstract

The content of this article gives a detail
explanation in the TLS protocol. Through the
article, a protocol performance analysis was
performed as well as an overview of how to use
it to maximize its capabilities. A special emphasis
on this article was put on the weaknesses of
the protocol to help you understand the threats
in its everyday use. In addition to dealing with
weaknesses in the protocol, we also explain the
possibilities of defense and how to avoid potential
threats.
The aim of the article is to bring close the
technology that is used in everyday life, although
in most cases we are not aware of it. Since the
basic purpose of the protocol is exchange of
sensitive data protocols, we wanted to bring
closer the correct use in eff ort to reduce the
risk of vulnerable data being compromised.
Also, by analyzing its weaknesses, we want to
raise awareness of protocol shortcomings and
thus contribute to the security of use. Through
the display of usage options, we would like to
show usage scenarios as well as the positive and
negative side depending on the case of use.

Keywords

TLS; cryptography; protocol

Hrčak ID:

194805

URI

https://hrcak.srce.hr/194805

Publication date:

15.11.2017.

Article data in other languages: croatian

Visits: 955 *