The proof: Securing Internet Protocol TLS 1.3

3 min read Original article ↗

1

Cisco. “Cisco Annual Internet Report (2018-2023) White Paper” . Cisco, 2019. [Online]. Available: Link (External) [Accessed: May 5, 2023].

2

United Nations, “World Population Prospects 2022: Summary of Results” , Department of Economic and Social Affairs, Population Division, 2022. [Online]. Available: Link (External) [Accessed: May 5, 2023].

3

U.S. Department of Commerce. (2021). “ Global E-Commerce Sales: Size and Forecast” . International Trade Administration. Link (External) [Accessed: May 5, 2023].

4

“Saarland”, Wikipedia, [Online]. Available: Link (External) . [Accessed: May 5, 2023].

5

ITU. (2015). “ ICT facts and figures 2015 ”. International Telecommunication Union. [Online]. Available: Link (External) . [Accessed: May 4, 2023].

6

T. Dierks, E. Rescorla, (2008). “ The Transport Layer Security (TLS) Protocol Version 1.2” . IETF RFC 5246. [Online]. Available: Link (External) . [Accessed: May 4, 2023].

7

A. L. Russell, (2006). “'Rough Consensus and Running Code' and the Internet-OSI Standards War” . IEEE Annals of the History of Computing, 28(3), 48–61. Link (External)

8

E. Rescorla, [LinkedIn-Profil]. (n.d.). Available: Link (External) . [Accessed: May 4, 2023].

9

E. Rescorla, SSL and TLS: Designing and Building Secure Systems . Addison-Wesley Professional, 2000. Available: Link (External) . [Accessed: May 4, 2023].

10

E. Rescorla, SSL and TLS: Designing and Building Secure Systems , Addison-Wesley Professional, 2000. Available: Link (External) . [Accessed: May 4, 2023].

11

C. Jones, P. O'Hearn, J. Woodcock, “Verified Software: A Grand Challenge” , Computer, vol. 39, pp. 93–95, April 2006.

12

T. Hoare, "The verifying compiler: A grand challenge for computing research" , Journal of the ACM, vol. 50, no. 1, pp. 63-69, January 2003.

13

J. Alben. “Formal Verification Specialist Oski Joins NVIDIA | NVIDIA Blog” . NVIDIA Blog. Available: Link (External) . [Accessed: February 10, 2023].

14

T. Ball, B. Cook, V. Levin, S. K. Rajamani, "SLAM and Static Driver Verifier: Technology Transfer of Formal Methods inside Microsoft" , January 28, 2004, Publications of the SLAM project, Redmond, WA 98052, United States of America. [Online]. Available: Link (External) . [Accessed: February 10, 2023].

15

Prof. Dr. C. Cremers, personal communication, April 5, 2022.

16

G. Bella, Formal Correctness of Security Protocols , Berlin, Germany: Springer, 2007.

17

“Tamarin Prover” , Available: Link (External) . [Accessed: May 25, 2023].

18

Dr. S. Scott, personal communication, May 28, 2020.

19

Dr. S. Scott, personal communication, May 28, 2020.

20

D. Basin, C. Cremers, J. Dreier, and R. Sasse, “Tamarin: Verification of Large-Scale, Real World, Cryptographic Protocols” , IEEE Security and Privacy Magazine, Institute of Electrical and Electronics Engineers.

“Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication” , YouTube, [Video published on Sep 2, 2016], Available: Link (External) . [Accessed: May 30, 2023].

D. Basin, C. Cremers, J. Dreier, and R. Sasse, “Tamarin: Verification of Large-Scale, Real World, Cryptographic Protocols” , IEEE Security and Privacy Magazine, Institute of Electrical and Electronics Engineers.

21

22

23

S. Scott, “[TLS] Revision 10: possible attack if client authentication is allowed during PSK” , TLS Mailing List, message sent on October 31, 2015. Available: Link (External)