requirements; administrators have to find the right ci-
pher string by balancing security strength and com-
patibility regarding their individual needs, using the
tools available at their disposal.
Considering this complexity as well as recently
discovered attack vectors against TLS like FREAK
(Beurdouche et al., 2015) and Logjam (Adrian et al.,
2015), a point of further research should be to deter-
mine if the algorithm variability present in the TLS
protocol might in fact be a severe weakness and differ-
ent approaches on selecting cryptographic primitives
could be considered.
ACKNOWLEDGEMENTS
Manuel Koschuch is being supported by the MA23
- Wirtschaft, Arbeit und Statistik - in the course
of the funding programme “Stiftungsprofessuren und
Kompetenzteams f
¨
ur die Wiener Fachhochschul-
Ausbildungen”.
REFERENCES
Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P.,
Green, M., Halderman, J. A., Heninger, N., Springall,
D., Thom, E., Valenta, L., VanderSloot, B., Wus-
trow, E., Zanella-Bguelink, S., and Zimmermann, P.
(2015). Imperfect Forward Secrecy: How Diffie-
Hellman Fails in Practice. Technical report, IN-
RIA Paris-Rocquencourt and INRIA Nancy-Grand
Est, CNRS and Universit de Lorraine and Microsoft
Research and University of Pennsylvania and Johns
Hopkins and University of Michigan.
Beurdouche, B., Bhargavan, K., Delignat-Lavaud, A., Four-
net, C., Kohlweiss, M., Pironti, A., Strub, P.-Y., and
Zinzindohoue, J. K. (2015). A Messy State of the
Union: Taming the Composite State Machines of
TLS. In IEEE Security & Privacy 2015, preprint.
Breyha, W., Durvaux, D., Dussa, T., Kaplan, L. A., Mendel,
F., Mock, C., Koschuch, M., Kriegisch, A., Pschl,
U., Sabet, R., San, B., Schlatterbeck, R., Schreck, T.,
Wrstlein, A., Zauner, A., and Zawodsky, P. (2015).
Applied Crypto Hardening. Technical report.
Chown, P. (2002). RFC3268 - Advanced Encryption Stan-
dard (AES) Ciphersuites for Transport Layer Security
(TLS). Technical report, Network Working Group.
Dierks, T. and Allen, C. (1999). RFC2246 - The TLS Pro-
tocol Version 1.0. Technical report, Network Working
Group.
Dierks, T. and Rescorla, E. (2006). RFC4346 - The Trans-
port Layer Security (TLS) Protocol Version 1.1. Tech-
nical report, Network Working Group.
Dierks, T. and Rescorla, E. (2008). RFC5246 - The Trans-
port Layer Security (TLS) Protocol Version 1.2. Tech-
nical report, Network Working Group.
Diffie, W. and Hellman, M. (2006). New directions in cryp-
tography. IEEE Trans. Inf. Theor., 22(6):644–654.
Eronen, P. and Tschofenig, H. (2005). RFC4279 - Pre-
Shared Key Ciphersuites for Transport Layer Security
(TLS). Technical report, Network Working Group.
Freier, A., Karlton, P., and P.Kocher (2011). RFC6101
- The Secure Sockets Layer (SSL) Protocol Version
3.0. Technical report, Internet Engineering Task Force
(IETF).
Huang, L., Adhikarla, S., Boneh, D., and Jackson, C.
(2014). An experimental study of TLS forward se-
crecy deployments. In IEEE CS Security and Privacy
Workshops.
Lee, H., Yoon, J., and Lee, J. (2005). RFC4162 - Addition
of SEED Cipher Suites to Transport Layer Security
(TLS). Technical report, Network Working Group.
Medvinsky, A. and Hur, M. (1999). RFC2712 - Addition of
Kerberos Cipher Suites to Transport Layer Security
(TLS). Technical report, Network Working Group.
Moriai, S., Kato, A., and Kanda, M. (2005). RFC4132 - Ad-
dition of Camellia Cipher Suites to Transport Layer
Security (TLS). Technical report, Network Working
Group.
NIST (2001). Advanced Encryption Standard (AES) (FIPS
PUB 197).
NIST (2012). Secure Hash Standard (SHS) (FIPS PUB 180-
4).
Popov, A. (2015). RFC7465 - Prohibiting RC4 Cipher
Suites. Technical report, Internet Engineering Task
Force (IETF).
Rivest, R. L., Shamir, A., and Adleman, L. (1978). A
method for obtaining digital signatures and public-key
cryptosystems. Commun. ACM, 21(2):120–126.
Stallings, W. (2008). Cryptography and Network Security,
page 539. Pearson, 4th edition.
SpeakinginTongues-PracticalEvaluationofTLSCipherSuitesCompatibility
23