1 research outputs found
CRYPTOGRAPHY PROTOCOL
Sadržaj ovoga članka detaljno objašnjava TLS
protokol. Kroz članak je napravljena analiza
izvedbe protokola i prikaz kako ga koristiti kako
bi izvukli maksimum njegovih mogućnosti.
Poseban naglasak ovoga članka stavljen je na
slabosti protokola kako bi lakše shvatili prijetnje
u njegovom svakodnevnom korištenju. Uz obradu
slabosti protokola objašnjavamo i mogućnosti
obrane i njihovog izbjegavanja kako bi izbjegli
potencijalne prijetnje. Cilj članka je približiti
tehnologiju koja se koristi u svakodnevnom
životu iako u većini slučajeva je nismo niti
svjesni. S obzirom da je osnovna svrha protokola
razmjena osjetljivih podataka želimo približiti
ispravno korištenje kako bi se smanjila mogućnost
ugrožavanja osjetljivih podataka. Također,
analizom njegovih slabosti željeli bismo osvijestiti
mane protokola i na taj način pridonijeti sigurnosti
korištenja. Kroz prikaz mogućnosti korištenja
željeli smo prikazati scenarije korištenja kao
i pozitivne i negativne strane ovisno o slučaju
korištenja.The content of this article gives a detail
explanation in the TLS protocol. Through the
article, a protocol performance analysis was
performed as well as an overview of how to use
it to maximize its capabilities. A special emphasis
on this article was put on the weaknesses of
the protocol to help you understand the threats
in its everyday use. In addition to dealing with
weaknesses in the protocol, we also explain the
possibilities of defense and how to avoid potential
threats.
The aim of the article is to bring close the
technology that is used in everyday life, although
in most cases we are not aware of it. Since the
basic purpose of the protocol is exchange of
sensitive data protocols, we wanted to bring
closer the correct use in eff ort to reduce the
risk of vulnerable data being compromised.
Also, by analyzing its weaknesses, we want to
raise awareness of protocol shortcomings and
thus contribute to the security of use. Through
the display of usage options, we would like to
show usage scenarios as well as the positive and
negative side depending on the case of use