1 research outputs found

    CRYPTOGRAPHY PROTOCOL

    Get PDF
    Sadržaj ovoga članka detaljno objašnjava TLS protokol. Kroz članak je napravljena analiza izvedbe protokola i prikaz kako ga koristiti kako bi izvukli maksimum njegovih mogućnosti. Poseban naglasak ovoga članka stavljen je na slabosti protokola kako bi lakše shvatili prijetnje u njegovom svakodnevnom korištenju. Uz obradu slabosti protokola objašnjavamo i mogućnosti obrane i njihovog izbjegavanja kako bi izbjegli potencijalne prijetnje. Cilj članka je približiti tehnologiju koja se koristi u svakodnevnom životu iako u većini slučajeva je nismo niti svjesni. S obzirom da je osnovna svrha protokola razmjena osjetljivih podataka želimo približiti ispravno korištenje kako bi se smanjila mogućnost ugrožavanja osjetljivih podataka. Također, analizom njegovih slabosti željeli bismo osvijestiti mane protokola i na taj način pridonijeti sigurnosti korištenja. Kroz prikaz mogućnosti korištenja željeli smo prikazati scenarije korištenja kao i pozitivne i negativne strane ovisno o slučaju korištenja.The content of this article gives a detail explanation in the TLS protocol. Through the article, a protocol performance analysis was performed as well as an overview of how to use it to maximize its capabilities. A special emphasis on this article was put on the weaknesses of the protocol to help you understand the threats in its everyday use. In addition to dealing with weaknesses in the protocol, we also explain the possibilities of defense and how to avoid potential threats. The aim of the article is to bring close the technology that is used in everyday life, although in most cases we are not aware of it. Since the basic purpose of the protocol is exchange of sensitive data protocols, we wanted to bring closer the correct use in eff ort to reduce the risk of vulnerable data being compromised. Also, by analyzing its weaknesses, we want to raise awareness of protocol shortcomings and thus contribute to the security of use. Through the display of usage options, we would like to show usage scenarios as well as the positive and negative side depending on the case of use
    corecore