-
Graziani, Rick - IPv6 Fundamentals - Chapter 8 - Dynamic IPv4 Address Allocation
-
zytrax - Survival guides - TLS/SSL and SSL (X.509) Certificates - TLS/SSL Protocol
-
MDN web docs - A typical HTTP session - Structure of a server response
-
Stackoverflow - How does SSL/TLS work? - Answer by Thomas Pornin
-
zytrax - Survival guides - TLS/SSL and SSL (X.509) Certificates - TLS 1.3 Detailed Description
-
RFC 8446 - TLS 1.3 - 2.2. Resumption and Pre-Shared Key (PSK)
-
Trend Micro - HTTPS Protocol Now Used in 58% of Phishing Websites
-
zytrax - Survival Guide - Encryption, Authentication - Symmetric Cryptography
-
zytrax - Survival Guide - Encryption, Authentication - Asymmetric Cryptography
-
zytrax - Survival Guide - Encryption, Authentication - (Ephemeral) Diffie-Hellman Exchange
-
RFC 5246 - TLS 1.2 - F.1.1.3. Diffie-Hellman Key Exchange with Authentication
-
zytrax - Survival Guide - Encryption, Authentication - Message Digests (Hashes)
-
zytrax - Survival Guide - Encryption, Authentication - Message Authentication Code (MAC)
-
zytrax - Survival Guide - Encryption, Authentication - Digital Signatures
-
Wikipedia - X.509 - Sample X.509 certificates - End-entity certificate
-
zytrax - Survival guides - TLS/SSL and SSL (X.509) Certificates - X.509 (SSL) Certificate Overview
-
RFC 5246 - TLS 1.2 - 7.4.7.1. RSA-Encrypted Premaster Secret Message
-
zytrax - Survival guides - TLS/SSL and SSL (X.509) Certificates - X.509 Certificate Format
-
RFC 5912 - New ASN.1 for PKIX - 14. ASN.1 Module for RFC 5280, Explicit and Implicit
-
RFC 5280 - PKIX Certificate and CRL Profile - 4.1. Basic Certificate Fields
-
RFC 5280 - PKIX Certificate and CRL Profile - 4.2.1.3. Key Usage
-
Wikipedia - X.509 - Certificates - Structure of a certificate
-
zytrax - Survival guides - TLS/SSL and SSL (X.509) Certificates - X.509 Certificate Usage
-
RFC 5280 - PKIX Certificate and CRL Profile - 4.1.2.4. Issuer
-
RFC 5280 - PKIX Certificate and CRL Profile - 4.1.2.3. Signature
-
RFC 5280 - PKIX Certificate and CRL Profile - 4.1.2.5. Validity
-
RFC 5280 - PKIX Certificate and CRL Profile - 4.1.2.6. Subject
-
RFC 5280 - PKIX Certificate and CRL Profile - 4.1.2.7. Subject Public Key Info
-
Vincent Bernat - TLS & Perfect Forward Secrecy - Diffie-Hellman with elliptic curves
-
RFC 5280 - PKIX Certificate and CRL Profile - 4.2.1.6. Subject Alternative Name
-
RFC 5280 - PKIX Certificate and CRL Profile - 4.2.1.9. Basic Constraints
-
RFC 5280 - PKIX Certificate and CRL Profile - 4.1.1.3. signatureValue
-
Information Security Stack Exchange - Why is the Signature Algorithm listed twice in an x509 Certificate? - Answer by BBerastegui
-
zytrax - Survival guides - TLS/SSL and SSL (X.509) Certificates - X.509 Certificate Chaining
-
Wikipedia - X.509 - Certificate chains and cross-certification
-
Wikipedia - X.509 - Sample X.509 certificates - Root certificate
-
The Chromium Projects - Chromium - Chromium Security - Root Certificate Policy
-
Crowe FST Audit Kft. and Crowe FST Consulting Kft. - Webtrust Audit
-
WEBTRUST® FOR CERTIFICATION AUTHORITIES - 2.2 Certificate Policy (CP) Management (if applicable)
-
Wikipedia - Comodo Cybersecurity - Controversies - Certificate hacking
-
Information Security Stack Exchange - Where are field names of decoded human readable X.509 certificates specified? - Answer by mti2935
-
X.509 - Sample X.509 certificates - Intermediate certificate
-
RFC 5280 - PKIX Certificate and CRL Profile - 4.1.1.2. signatureAlgorithm
-
zytrax - Survival guides - TLS/SSL and SSL (X.509) Certificates - Certificate Bundles
-
zytrax - Survival guides - TLS/SSL and SSL (X.509) Certificates - SSL Related File Format Notes
-
SSL.com - How Do Browsers Handle Revoked SSL/TLS Certificates?
-
iana.org - Transport Layer Security (TLS) Parameters - TLS Cipher Suites
-
RFC 7924 - TLS 1.2 Cached Information Extension - 1. Introduction
-
RFC 7924 - TLS 1.2 Cached Information Extension - 3. Cached Information Extension
-
RFC 7924 - TLS 1.2 Cached Information Extension - 5. Fingerprint Calculation
-
RFC 7924 - TLS 1.2 Cached Information Extension - 4.1. Server Certificate Message
-
RFC 5246 - TLS 1.2 - 7.4.7.1. RSA-Encrypted Premaster Secret Message
-
RFC 5246 - TLS 1.2 - 7.4.7.2. Client Diffie-Hellman Public Value
-
RFC 5246 - TLS 1.2 - F.1.1.2. RSA Key Exchange and Authentication
-
RFC 8422 - ECC Cipher Suites for TLS 1.2 - 2. Key Exchange Algorithm
-
RFC 8422 - ECC Cipher Suites for TLS 1.2 - 5.4. Server Key Exchange
-
RFC 8422 - ECC Cipher Suites for TLS 1.2 - 5.7. Client Key Exchange
-
RFC 8422 - ECC Cipher Suites for TLS 1.2 - 5.10. ECDH, ECDSA, and RSA Computations
-
RFC 7627 - TLS 1.2 Session Hash Extension - 3. The TLS Session Hash
-
RFC 5246 - TLS 1.2 - 6.2.2. Record Compression and Decompression
-
RFC 5246 - TLS 1.2 - 6.2.3.1. Null or Standard Stream Cipher
-
Wikipedia - Authenticated encryption - Authenticated encryption with associated data (AEAD)
-
Navok, Svetlin - Practical Cryptography for Developers - Asymmetric Key Ciphers - ECDH Key Exchange
-
RFC 8446 - TLS 1.3 - 4.4.2.4. Receiving a Certificate Message
-
RFC 8446 - TLS 1.3 - 4.4.2.1. OCSP Status and SCT Extensions
-
RFC 8446 - TLS 1.3 - 4.6.3. Key and Initialization Vector Update
-
Luykx, Atul - Paterson, Kenneth G. - Limits on Authenticated Encryption Use in TLS
-
GEEKFLARE - Kumar, Chandan - How to Setup Apache HTTP with SSL
-
Wikipedia - HTTP Strict Transport Security - HSTS mechanism overview
-
MDN web docs - HTTP - HTTP headers - Strict-Transport-Security - Description
-
MDN web docs - HTTP - HTTP headers - Strict-Transport-Security - Directives
-
GlobalSign Support - Root & Intermediate Certificate Bundles
-
RFC 6960 - PKIX Online Certificate Status Protocol - OCSP - 2. Protocol Overview
-
RFC 6960 - PKIX Online Certificate Status Protocol - OCSP - 3.1. Certificate Content
-
RFC 6960 - PKIX Online Certificate Status Protocol - OCSP - 2.1. Request
-
RFC 6960 - PKIX Online Certificate Status Protocol - OCSP - 2.2. Response
-
RFC 6961 - TLS Multiple Certificate Status Extension - 1. Introduction
-
RFC 6066 - TLS Extensions: Extension Definitions - 8. Certificate Status Request
-
RFC 6960 - PKIX Online Certificate Status Protocol - OCSP - 4.2.2.2. Authorized Responders
-
RFC 6960 - PKIX Online Certificate Status Protocol - OCSP - 4.2.2.3. Basic Response
-
Chung, Taejoong - APNIC - Is the web ready for OCSP Must-Staple?
-
RFC 5246 - TLS 1.2 - F.1.1.3. Diffie-Hellman Key Exchange with Authentication