Part IV Bleeding Hearts and Biting Poodles
In this part, we first give an overview of the attacks on cryptography and then extensively discuss known attacks on previous TLS versions. We show how these attacks work, what TLS security guarantees they undermine, and how the TLS protocol was improved over time to withstand these attacks.
More precisely, we discuss known attacks on the TLS Handshake protocol, on the TLS Record protocol, and on implementations of TLS. After completing this part, you will have a solid understanding of how cryptographic protocols, and in particular, previous TLS versions, are attacked in practice.
This part contains the following chapters:
Chapter 19, Attacks on Cryptography
Chapter 20, Attacks on the TLS Handshake Protocol
Chapter 21, Attacks on the TLS Record Protocol
Chapter 22, Attacks on TLS Implementations