Polytechnic and design, Vol. 5 No. 1, 2017.
Review article
https://doi.org/10.19279/TVZ.PD.2017-5-1-11
CRYPTOGRAPHY PROTOCOL
Ninoslav Ceglec
; Zagreb University of Applied Sciences, Zagreb, Croatia, Student
Dubravko Žigman
orcid.org/0000-0002-9231-532X
; Zagreb University of Applied Sciences, Zagreb, Croatia
Abstract
The content of this article gives a detail
explanation in the TLS protocol. Through the
article, a protocol performance analysis was
performed as well as an overview of how to use
it to maximize its capabilities. A special emphasis
on this article was put on the weaknesses of
the protocol to help you understand the threats
in its everyday use. In addition to dealing with
weaknesses in the protocol, we also explain the
possibilities of defense and how to avoid potential
threats.
The aim of the article is to bring close the
technology that is used in everyday life, although
in most cases we are not aware of it. Since the
basic purpose of the protocol is exchange of
sensitive data protocols, we wanted to bring
closer the correct use in eff ort to reduce the
risk of vulnerable data being compromised.
Also, by analyzing its weaknesses, we want to
raise awareness of protocol shortcomings and
thus contribute to the security of use. Through
the display of usage options, we would like to
show usage scenarios as well as the positive and
negative side depending on the case of use.
Keywords
Hrčak ID:
194805
URI
Publication date:
15.11.2017.
Visits: 1.401 *