Anyone care to give a "layman's" explanation of the attack? The explanations I have seen assume a detailed knowledge of the way TLS/SSL handle re-negotiation, which is not something that is easy to come by without reading the RFC. (As opposed to the main protocol, where one can find textbook descriptions.)

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to

Reply via email to