{"title":"Key Vulnerabilities in SSL & TLS That Needs To Be Mitigated","authors":"S. Alhazmi, K. Elleithy","doi":"10.1109/LISAT58403.2023.10179546","DOIUrl":null,"url":null,"abstract":"The cryptographic security protocols are designed to ensure that the information transmission that is taking place between two entities is secured and is not impacted while interaction occurs among them. Security protocols are a set of rules that are formulated to ensure that the intruder or third party is not able to access the information that is transmitted. In this context, one of the algorithms that could be used is the RC4 algorithm. There are many discussions about the RC4 algorithm, but as of now is only theoretically dominant. It is a fact that the theory alone cannot complete the RCA algorithm process in a detailed manner. The applications reveal the input and do not produce any output of the processes involved. This research paper will illustrate the vulnerability and possible solutions to avoid the RC4 Algorithm attack.","PeriodicalId":250536,"journal":{"name":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LISAT58403.2023.10179546","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The cryptographic security protocols are designed to ensure that the information transmission that is taking place between two entities is secured and is not impacted while interaction occurs among them. Security protocols are a set of rules that are formulated to ensure that the intruder or third party is not able to access the information that is transmitted. In this context, one of the algorithms that could be used is the RC4 algorithm. There are many discussions about the RC4 algorithm, but as of now is only theoretically dominant. It is a fact that the theory alone cannot complete the RCA algorithm process in a detailed manner. The applications reveal the input and do not produce any output of the processes involved. This research paper will illustrate the vulnerability and possible solutions to avoid the RC4 Algorithm attack.