Here`s another good article on the Lucky Thirteen breach quoting SSL researcher Ivan Ristic: http://www.computerworlduk.com/news/security/3424689/new-attack-techniques-against-ssl-revealed/
Read MoreMore TagMonth: February 2013
wolfSSL, provider of CyaSSL Embedded SSL, releases first embedded TLS and DTLS protocol fix for Lucky Thirteen Attack
Researchers have found a new a new attack vector for TLS 1.1 and 1.2 protocol implementations, which wolfSSL has promptly fixed in its leading embedded TLS product. In the paper “Lucky Thirteen: Breaking the TLS and DTLS Record Protocols” authors Nadhem AlFardan and Kenneth Paterson present a family of attacks that apply to CBC-mode for […]
Read MoreMore TagwolfSSL 2.5.0 is Now Available
Release 2.5.0 of the wolfSSL lightweight SSL/TLS library has been released and is now available for download. This release has bug fixes and new features including: – Fix for TLS CBC padding timing attack identified by Nadhem Alfardan and Kenny Paterson: http://www.isg.rhul.ac.uk/tls/– Microchip PIC32 (MIPS16, MIPS32) support– Microchip MPLAB X example projects for PIC32 Ethernet […]
Read MoreMore Tag
