Documente Academic
Documente Profesional
Documente Cultură
DSL ADSL
According to the protocol specification, TLS is composed of two layers: the TLS Record Protocol
and the TLS Handshake Protocol. The Record Protocol provides connection security, while the
Handshake Protocol allows the server and client to authenticate each other and to negotiate
encryption algorithms and cryptographic keys before any data is exchanged.
Although TLS is not vulnerable to the POODLE attack, because it specifies that all padding
bytes must have the same value and be verified, a variant of the attack has exploited certain
implementations of the TLS protocol that don't correctly validate encryption padding. This
makes some systems vulnerable to POODLE, even if they disable SSL -- one of the
recommended techniques for countering a POODLE attack.
The IETF's Using TLS in Applications (UTA) working group plans to offer commonguidelines and
best practices for using TLS in applications, such as the use of the latestcryptographic
algorithms and eliminating the use of older TLS/SSL versions, as well asguidance on how certain
applications should use the encryption protocol. TLS 1.3 is still adraft and has not been finalized
yet, but having an updated protocol that's faster, moresecure and easier to implement is
essential to ensure the privacy and security ofinformation exchange and maintain trust in the
Internet as a whole.
Origin:
CDMA uses spread spectrum, a technology that was developed in World War II to prevent
enemies from intercepting and jamming transmissions. In spread spectrum, a data signal is
sent over a range of frequencies in an assigned frequency spectrum.
A pseudo-random spreading code is used to multiplex the base signal. Multiplexing with a
spreading code increases the bandwidth required for the signal, spreading it out over the
available spectrum. The receiving device is aware of the spreading code and uses it to
demultiplex the signal.
CDMA provides a certain amount of built-in security, as the transmissions of multiple users
are mixed together within the frequency spectrum. The spreading code is required to decode
a specific transmission.
Application:
Different variations of CDM and CDMA are used in 2G and subsequent generations of
cellphone technology.
Working:
CDM does not rely on physical properties(such as frequency or time)
Each sender is assigned a unique binary code Ci that is known as a chip sequence. chip
sequences are selected to be orthogonal vectors (i.e., the dot product of any two chip
sequences is zero)
At any point in time, each sender has a value to transmit, Vi. The senders each multiply
Ci x Vi and transmit the results
The senders transmit at the same timeand the values are added together
Consider an example
– to keep the example easy to understand, use a chip sequence that is only two
bits long and data values that are four bits long
•
A receiver treats the sequence as a vector
– treats the result as a sequence, and converts the result to binary by interpreting
positive values as binary 1 and negative values as 0
C1