Useful Links
Computer Science
Cybersecurity
SSL/TLS Security and Implementation
1. Introduction to SSL/TLS
2. Cryptographic Foundations
3. Public Key Infrastructure
4. TLS Handshake Protocol
5. Cipher Suite Architecture
6. Server Implementation
7. Security Vulnerabilities
8. Security Best Practices
9. Advanced Features and Technologies
Security Vulnerabilities
Protocol-Level Attacks
Downgrade Attacks
Protocol Version Downgrade
Cipher Suite Downgrade
POODLE Attack
SSL 3.0 Padding Oracle
Mitigation Strategies
Man-in-the-Middle Attacks
SSL Stripping
Certificate Substitution
Rogue Certificate Authorities
Implementation Vulnerabilities
Heartbleed Vulnerability
OpenSSL Memory Disclosure
Impact Assessment
Mitigation Measures
Apple goto fail Bug
Signature Verification Bypass
Code Quality Issues
Cryptographic Attacks
Block Cipher Attacks
BEAST Attack
CBC Mode Exploitation
Browser Mitigation
Lucky 13 Attack
Timing Side Channel
Padding Oracle Variant
Compression Attacks
CRIME Attack
TLS Compression Exploitation
BREACH Attack
HTTP Compression Exploitation
Key Exchange Attacks
Logjam Attack
Weak Diffie-Hellman Parameters
FREAK Attack
Export-Grade RSA Exploitation
Side-Channel Attacks
Timing Attacks
Cryptographic Operation Timing
Statistical Analysis
Power Analysis Attacks
Simple Power Analysis
Differential Power Analysis
Cache-Based Attacks
Cache Timing Attacks
Flush+Reload Attacks
Previous
6. Server Implementation
Go to top
Next
8. Security Best Practices