Dismiss
There will be a system update on Friday, May 5th, 6 PM ET. You may experience a brief service interruption.
Browse Prior Art Database

The TLS Protocol Version 1.0 (RFC2246)

IP.com Disclosure Number: IPCOM000002805D
Original Publication Date: 1999-Jan-01
Included in the Prior Art Database: 2000-Sep-13

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

T. Dierks: AUTHOR [+2]

Abstract

This document specifies Version 1.0 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

This text was extracted from a ASCII Text document.
This is the abbreviated version, containing approximately 2% of the total text.

Network Working Group T. Dierks

Request for Comments: 2246 Certicom

Category: Standards Track C. Allen

Certicom

January 1999

The TLS Protocol

Version 1.0

Status of this Memo

This document specifies an Internet standards track protocol for the

Internet community, and requests discussion and suggestions for

improvements. Please refer to the current edition of the "Internet

Official Protocol Standards" (STD 1) for the standardization state

and status of this protocol. Distribution of this memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (1999). All Rights Reserved.

Abstract

This document specifies Version 1.0 of the Transport Layer Security

(TLS) protocol. The TLS protocol provides communications privacy over

the Internet. The protocol allows client/server applications to

communicate in a way that is designed to prevent eavesdropping,

tampering, or message forgery.

Table of Contents

1. Introduction 3

2. Goals 4

3. Goals of this document 5

4. Presentation language 5

4.1. Basic block size 6

4.2. Miscellaneous 6

4.3. Vectors 6

4.4. Numbers 7

4.5. Enumerateds 7

4.6. Constructed types 8

4.6.1. Variants 9

4.7. Cryptographic attributes 10

4.8. Constants 11

5. HMAC and the pseudorandom function 11

6. The TLS Record Protocol 13

6.1. Connection states 14

6.2. Record layer 16

6.2.1. Fragmentation 16

6.2.2. Record compression and decompression 17

6.2.3. Record payload protection 18

6.2.3.1. Null or standard stream cipher 19

6.2.3.2. CBC block cipher 19

6.3. Key calculation 21

6.3.1. Export key generation example 22

7. The TLS Handshake Protocol 23

...