Several versions of the TLS protocol exist. SSL 2.0 is a deprecated protocol version with significant weaknesses. SSL 3.0 (1996) and TLS 1.0 (1999) are successors with two weaknesses in CBC-padding that were explained in 2001 by Serge Vaudenay. TLS 1.1 (2006) fixed only one of the problems, by switching to random initialization vectors (IV) for CBC block ciphers, whereas the more problematic use of mac-pad-encrypt instead of the secure pad-mac-encrypt was addressed with RFC 7366. A workaround for SSL 3.0 and TLS 1.0, roughly equivalent to random IVs from TLS 1.1, was widely adopted by many implementations in late 2011. In 2014, the POODLE vulnerability of SSL 3.0 was discovered, which takes advantage of the known vulnerabilities in CBC, and an insecure fallback negotiation used in browsers.
TLS 1.2 (2008) introduced a means to identify the hash used for digital signatures. While permitting the use of stronger hash functions for digital signatures in the future (rsa,sha256/sha384/sha512) over the SSL 3.0 conservative choice (rsa,sha1+md5), the TLS 1.2 protocol change inadvertently and substantially weakened the default digital signatures and provides (rsa,sha1) and even (rsa,md5).
TLS 1.3 (2018) specified in RFC 8446 includes major optimizations and security improvements. QUIC (2021) specified in RFC 9000 and DTLS 1.3 (2022) specified in RFC 9147 builds on TLS 1.3. The publishing of TLS 1.3 and DTLS 1.3 obsoleted TLS 1.2 and DTLS 1.2.
Note that there are known vulnerabilities in SSL 2.0 and SSL 3.0. In 2021, IETF published RFC 8996 also forbidding negotiation of TLS 1.0, TLS 1.1, and DTLS 1.0 due to known vulnerabilities. NIST SP 800-52 requires support of TLS 1.3 by January 2024. Support of TLS 1.3 means that two compliant nodes will never negotiate TLS 1.2.
Per CNSSP-15, the 256-bit elliptic curve (specified in FIPS 186-2), SHA-256, and AES with 128-bit keys are sufficient for protecting classified information up to the Secret level, while the 384-bit elliptic curve (specified in FIPS 186-2), SHA-384, and AES with 256-bit keys are necessary for the protection of Top Secret information.
Note that certain certifications have received serious negative criticism from people who are actually involved in them.
This section lists the certificate verification functionality available in the various implementations.
In this section the extensions each implementation supports are listed. Note that the Secure Renegotiation extension is critical for HTTPS client security . TLS clients not implementing it are vulnerable to attacks, irrespective of whether the client implements TLS renegotiation.
This section lists the known ability of an implementation to take advantage of CPU instruction sets that optimize encryption, or utilize system specific devices that allow access to underlying cryptographic hardware for acceleration or for data separation.
This section lists the ability of an implementation to take advantage of the available operating system specific backends, or even the backends provided by another implementation.
"Botan: Release Notes". Retrieved 2025-01-22. https://botan.randombit.net/#releases
"Download Bouncy Castle for Java - bouncycastle.org". 2025-01-14. Retrieved 2025-02-16. https://www.bouncycastle.org/download/bouncy-castle-java/
"Download Bouncy Castle for Java LTS - bouncycastle.org". 2024-11-08. Retrieved 2024-11-29. https://www.bouncycastle.org/download/bouncy-castle-java-lts/
"Download Bouncy Castle for Java FIPS - bouncycastle.org". 2024-07-30. Retrieved 2024-11-29. https://www.bouncycastle.org/download/bouncy-castle-java-fips/
"Download Bouncy Castle for C# .NET - bouncycastle.org". 2025-02-14. Retrieved 2024-02-16. https://www.bouncycastle.org/download/bouncy-castle-c/
"Download Bouncy Castle for C# .NET FIPS - bouncycastle.org". 2024-03-11. Retrieved 2024-11-29. https://www.bouncycastle.org/download/bouncy-castle-c-fips/
"Dell BSAFE SSL-J 6.6 Release Advisory". Dell. https://www.dell.com/support/kbdoc/000226622/dell-bsafe-ssl-j-6-6-release-advisory
"Dell BSAFE SSL-J 7.3.1 Release Advisory". Dell. https://www.dell.com/support/kbdoc/000233524/dell-bsafe-ssl-j-7-3-1-release-advisory
"Dell BSAFE Micro Edition Suite 5.0.3 Release Advisory". https://www.dell.com/support/kbdoc/000254066
Gutmann, Peter (2019). "Downloading". cryptlib. University of Auckland School of Computer Science. Retrieved 2019-08-07. /wiki/Peter_Gutmann_(computer_scientist)
Daiki Ueno (8 February 2025). https://lists.gnupg.org/pipermail/gnutls-help/2025-February/004875.html. Retrieved 13 February 2025. {{cite web}}: Missing or empty |title= (help) https://lists.gnupg.org/pipermail/gnutls-help/2025-February/004875.html
"Java™ SE Development Kit 23, 23.0.1 Release Notes". Oracle Corporation. Retrieved 2024-10-16. https://www.oracle.com/java/technologies/javase/23-0-1-relnotes.html
"Java™ SE Development Kit 21, 21.0.5 Release Notes". Oracle Corporation. Retrieved 2024-10-16. https://www.oracle.com/java/technologies/javase/21-0-5-relnotes.html
"Java™ SE Development Kit 17, 17.0.13 Release Notes". Oracle Corporation. Retrieved 2024-10-16. https://www.oracle.com/java/technologies/javase/17-0-13-relnotes.html
"Java™ SE Development Kit 11, 11.0.25 Release Notes". Oracle Corporation. Retrieved 2024-10-16. https://www.oracle.com/java/technologies/javase/11-0-25-relnotes.html
"Java™ SE Development Kit 8, Update 431 Release Notes". Oracle Corporation. Retrieved 2024-10-16. https://www.oracle.com/java/technologies/javase/8u431-relnotes.html
"LibreSSL 4.0.0 Released". 14 October 2024. Retrieved 15 October 2024. https://marc.info/?l=openbsd-announce&m=172897399729957&w=2
The features listed are for the closed source version
"MatrixSSL 4.2.2 Open release". 2019-09-11. Retrieved 2020-03-20. https://github.com/matrixssl/matrixssl/releases/tag/4-2-2-open
"Release 3.6.3". 24 March 2025. Retrieved 27 March 2025. https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-3.6.3
"NSS:Release versions". Mozilla Wiki. Retrieved 7 November 2022. https://wiki.mozilla.org/NSS:Release_Versions
"NSS:Release versions". Mozilla Wiki. Retrieved 7 November 2022. https://wiki.mozilla.org/NSS:Release_Versions
Apache-2.0 for OpenSSL 3.0 and later releases. OpenSSL-SSLeay dual-license for any release before OpenSSL 3.0. /wiki/OpenSSL_license#Licensing
"OpenSSL 3.4.1". 11 February 2025. Retrieved 11 February 2025. https://github.com/openssl/openssl/releases/tag/openssl-3.4.1
"rustls/rustls releases". Github. Retrieved 1 April 2025. https://github.com/rustls/rustls/releases
"wolfSSL product description". Retrieved 2016-05-03. https://www.wolfssl.com/wolfSSL/Products-wolfssl.html
"wolfSSL Embedded SSL/TLS". Retrieved 2016-05-03. https://www.wolfssl.com
"wolfSSL ChangeLog". 2024-12-31. Retrieved 2024-12-31. https://www.wolfssl.com/docs/wolfssl-changelog/
Prohibiting Secure Sockets Layer (SSL) Version 2.0. doi:10.17487/RFC6176. RFC 6176. https://datatracker.ietf.org/doc/html/rfc6176
Vaudenay, Serge (2001). "CBC-Padding: Security Flaws in SSL, IPsec, WTLS,..." (PDF). http://infoscience.epfl.ch/record/52417/files/IC_TECH_REPORT_200150.pdf
Encrypt-then-MAC for Transport Layer Security (TLS) and Datagram Transport Layer Security. doi:10.17487/RFC7366. RFC 7366. https://datatracker.ietf.org/doc/html/rfc7366
"Rizzo/Duong BEAST Countermeasures". Archived from the original on 2016-03-11. https://web.archive.org/web/20160311153448/https://educatedguesswork.org/2011/11/rizzoduong_beast_countermeasur.html
Möller, Bodo; Duong, Thai; Kotowicz, Krzysztof (September 2014). "This POODLE Bites: Exploiting The SSL 3.0 Fallback" (PDF). Archived from the original (PDF) on 15 October 2014. Retrieved 15 October 2014. https://web.archive.org/web/20141015204410/https://www.openssl.org/~bodo/ssl-poodle.pdf
"TLSv1.2's Major Differences from TLSv1.1". The Transport Layer Security (TLS) Protocol Version 1.2. sec. 1.2. doi:10.17487/RFC5246. RFC 5246. https://datatracker.ietf.org/doc/html/rfc5246#section-1.2
RFC 6347. doi:10.17487/RFC6347. https://datatracker.ietf.org/doc/html/rfc6347
Elgamal, Taher; Hickman, Kipp E. B. (19 April 1995). The SSL Protocol. I-D draft-hickman-netscape-ssl-00. https://datatracker.ietf.org/doc/html/draft-hickman-netscape-ssl-00
RFC 6101. doi:10.17487/RFC6101. https://datatracker.ietf.org/doc/html/rfc6101
RFC 2246. doi:10.17487/RFC2246. https://datatracker.ietf.org/doc/html/rfc2246
RFC 4346. doi:10.17487/RFC4346. https://datatracker.ietf.org/doc/html/rfc4346
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 4347. doi:10.17487/RFC4347. https://datatracker.ietf.org/doc/html/rfc4347
RFC 6347. doi:10.17487/RFC6347. https://datatracker.ietf.org/doc/html/rfc6347
"Version 1.11.13, 2015-01-11 — Botan". 2015-01-11. Archived from the original on 2015-01-09. Retrieved 2015-01-16. https://web.archive.org/web/20150109154102/http://botan.randombit.net/relnotes/1_11_13.html
"RSA BSAFE Technical Specification Comparison Tables" (PDF). Archived from the original (PDF) on 2015-09-24. Retrieved 2015-01-09. https://web.archive.org/web/20150924043531/http://www.emc.com/collateral/data-sheet/11433-bsafe-tech-table.pdf
As of SSL-J 7.0, support for TLS 1.0 and 1.1 has been removed
As of SSL-J 7.0, support for TLS 1.0 and 1.1 has been removed
SSL 2.0 client hello is supported for backward compatibility reasons even though SSL 2.0 is not supported.
"[gnutls-devel] GnuTLS 3.4.0 released". 2015-04-08. Retrieved 2015-04-16. http://lists.gnutls.org/pipermail/gnutls-devel/2015-April/007535.html
"[gnutls-devel] GnuTLS 3.6.3". 2018-07-16. Retrieved 2018-09-16. https://lists.gnupg.org/pipermail/gnutls-devel/2018-July/008584.html
SSL 2.0 client hello is supported for backward compatibility reasons even though SSL 2.0 is not supported.
"Java SE Development Kit 8, Update 31 Release Notes". Retrieved 2024-01-14. https://www.oracle.com/java/technologies/javase/8u31-relnotes.html
"Release Note: Disable TLS 1.0 and 1.1". Retrieved 2024-01-14. https://bugs.openjdk.org/browse/JDK-8256490
"Release Note: Disable TLS 1.0 and 1.1". Retrieved 2024-01-14. https://bugs.openjdk.org/browse/JDK-8256490
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"LibreSSL 2.3.0 Released". 2015-09-23. Retrieved 2015-09-24. https://marc.info/?l=openbsd-announce&m=144304330731220
"LibreSSL 3.3.3 Released". 2021-05-04. Retrieved 2021-05-04. https://marc.info/?l=openbsd-announce&m=162009196519308
"MatrixSSL - News". Archived from the original on 2015-02-14. Retrieved 2014-11-09. https://web.archive.org/web/20150214105056/http://www.matrixssl.org/news.html
"Mbed TLS 3.0.0 branch released". GitHub. 2021-07-07. Retrieved 2021-08-13. https://github.com/ARMmbed/mbedtls/blob/93a3ca6caf20e0e1a90c86ee2fc03e9f1fb4ebfa/ChangeLog
"Mbed TLS 3.0.0 branch released". GitHub. 2021-07-07. Retrieved 2021-08-13. https://github.com/ARMmbed/mbedtls/blob/93a3ca6caf20e0e1a90c86ee2fc03e9f1fb4ebfa/ChangeLog
"Mbed TLS 3.0.0 branch released". GitHub. 2021-07-07. Retrieved 2021-08-13. https://github.com/ARMmbed/mbedtls/blob/93a3ca6caf20e0e1a90c86ee2fc03e9f1fb4ebfa/ChangeLog
"mbed TLS 2.0.0 released". 2015-07-10. Retrieved 2015-07-14. https://tls.mbed.org/tech-updates/releases/mbedtls-2.0.0-released
"mbed TLS 2.0.0 released". 2015-07-10. Retrieved 2015-07-14. https://tls.mbed.org/tech-updates/releases/mbedtls-2.0.0-released
Server-side implementation of the SSL/TLS protocol still supports processing of received v2-compatible client hello messages."NSS 3.24 release notes". Mozilla Developer Network. Mozilla. Archived from the original on 2016-08-26. Retrieved 2016-06-19. https://web.archive.org/web/20160826100711/https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.24_release_notes
"NSS 3.19 release notes". Mozilla Developer Network. Mozilla. Archived from the original on 2015-06-05. Retrieved 2015-05-06. https://web.archive.org/web/20150605054647/https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19_release_notes
"NSS 3.14 release notes". Mozilla Developer Network. Mozilla. Archived from the original on 2013-01-17. Retrieved 2012-10-27. https://web.archive.org/web/20130117130029/https://developer.mozilla.org/en-US/docs/NSS/NSS_3.14_release_notes
"NSS 3.15.1 release notes". Mozilla Developer Network. Mozilla. Retrieved 2013-08-10. https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.1_release_notes
"NSS 3.39 release notes". Mozilla Developer Network. Mozilla. 2018-08-31. Archived from the original on 2021-12-07. Retrieved 2018-09-15. https://web.archive.org/web/20211207014212/https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.39_release_notes#Notable_Changes_in_NSS_3.39
"NSS 3.14 release notes". Mozilla Developer Network. Mozilla. Archived from the original on 2013-01-17. Retrieved 2012-10-27. https://web.archive.org/web/20130117130029/https://developer.mozilla.org/en-US/docs/NSS/NSS_3.14_release_notes
"NSS 3.16.2 release notes". Mozilla Developer Network. Mozilla. 2014-06-30. Archived from the original on 2021-12-07. Retrieved 2014-06-30. https://web.archive.org/web/20211207015257/https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.2_release_notes
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012]". 2012-03-14. Archived from the original on December 5, 2014. Retrieved 2015-01-20. https://web.archive.org/web/20141205180836/http://www.openssl.org/news/openssl-1.0.1-notes.html
"Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012]". 2012-03-14. Archived from the original on December 5, 2014. Retrieved 2015-01-20. https://web.archive.org/web/20141205180836/http://www.openssl.org/news/openssl-1.0.1-notes.html
"Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.2 [22 Jan 2015]". Archived from the original on September 4, 2014. Retrieved 2015-01-22. https://web.archive.org/web/20140904045720/http://www.openssl.org/news/openssl-1.0.2-notes.html
"rustls implemented and unimplemented features documentation". Retrieved 2024-08-28. https://docs.rs/rustls/0.23.12/rustls/manual/_04_features/index.html
"rustls implemented and unimplemented features documentation". Retrieved 2024-08-28. https://docs.rs/rustls/0.23.12/rustls/manual/_04_features/index.html
"rustls implemented and unimplemented features documentation". Retrieved 2024-08-28. https://docs.rs/rustls/0.23.12/rustls/manual/_04_features/index.html
"rustls implemented and unimplemented features documentation". Retrieved 2024-08-28. https://docs.rs/rustls/0.23.12/rustls/manual/_04_features/index.html
"rustls implemented and unimplemented features documentation". Retrieved 2024-08-28. https://docs.rs/rustls/0.23.12/rustls/manual/_04_features/index.html
"rustls implemented and unimplemented features documentation". Retrieved 2024-08-28. https://docs.rs/rustls/0.23.12/rustls/manual/_04_features/index.html
"S2N Readme". GitHub. 2019-12-21. https://github.com/awslabs/s2n/blob/master/README.md
"TLS Cipher Suites (Windows)". msdn.microsoft.com. 14 July 2023. http://msdn.microsoft.com/en-us/library/aa380512.aspx
"TLS Cipher Suites in Windows Vista (Windows)". msdn.microsoft.com. 25 October 2021. http://msdn.microsoft.com/en-us/library/ff468651.aspx
"TLS Cipher Suites in Windows Vista (Windows)". msdn.microsoft.com. 25 October 2021. http://msdn.microsoft.com/en-us/library/ff468651.aspx
"Cipher Suites in TLS/SSL (Schannel SSP) (Windows)". msdn.microsoft.com. 14 July 2023. http://msdn.microsoft.com/en-us/library/aa374757.aspx
"An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1". Microsoft. Retrieved 13 November 2012. http://support.microsoft.com/kb/2574819/en-us
"An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1". Microsoft. Retrieved 13 November 2012. http://support.microsoft.com/kb/2574819/en-us
"Cipher Suites in TLS/SSL (Schannel SSP) (Windows)". msdn.microsoft.com. 14 July 2023. http://msdn.microsoft.com/en-us/library/aa374757.aspx
"Cipher Suites in TLS/SSL (Schannel SSP) (Windows)". msdn.microsoft.com. 14 July 2023. http://msdn.microsoft.com/en-us/library/aa374757.aspx
"Protocols in TLS/SSL (Schannel SSP)". Microsoft. 2022-05-25. Retrieved 2023-11-18. https://learn.microsoft.com/en-us/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp-
"Protocols in TLS/SSL (Schannel SSP)". 25 May 2022. Retrieved 6 November 2022. https://learn.microsoft.com/en-us/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp-
Secure Transport: SSL 2.0 was discontinued in OS X 10.8. SSL 3.0 was discontinued in OS X 10.11 and iOS 9.TLS 1.1, 1.2 and DTLS are available on iOS 5.0 and later, and OS X 10.9 and later."Technical Note TN2287: iOS 5 and TLS 1.2 Interoperability Issues". iOS Developer Library. Apple Inc. Retrieved 2012-05-03. https://developer.apple.com/library/ios/technotes/tn2287/
Secure Transport: SSL 2.0 was discontinued in OS X 10.8. SSL 3.0 was discontinued in OS X 10.11 and iOS 9.TLS 1.1, 1.2 and DTLS are available on iOS 5.0 and later, and OS X 10.9 and later."Technical Note TN2287: iOS 5 and TLS 1.2 Interoperability Issues". iOS Developer Library. Apple Inc. Retrieved 2012-05-03. https://developer.apple.com/library/ios/technotes/tn2287/
Secure Transport: SSL 2.0 was discontinued in OS X 10.8. SSL 3.0 was discontinued in OS X 10.11 and iOS 9.TLS 1.1, 1.2 and DTLS are available on iOS 5.0 and later, and OS X 10.9 and later."Technical Note TN2287: iOS 5 and TLS 1.2 Interoperability Issues". iOS Developer Library. Apple Inc. Retrieved 2012-05-03. https://developer.apple.com/library/ios/technotes/tn2287/
Secure Transport: SSL 2.0 was discontinued in OS X 10.8. SSL 3.0 was discontinued in OS X 10.11 and iOS 9.TLS 1.1, 1.2 and DTLS are available on iOS 5.0 and later, and OS X 10.9 and later."Technical Note TN2287: iOS 5 and TLS 1.2 Interoperability Issues". iOS Developer Library. Apple Inc. Retrieved 2012-05-03. https://developer.apple.com/library/ios/technotes/tn2287/
Secure Transport: SSL 2.0 was discontinued in OS X 10.8. SSL 3.0 was discontinued in OS X 10.11 and iOS 9.TLS 1.1, 1.2 and DTLS are available on iOS 5.0 and later, and OS X 10.9 and later."Technical Note TN2287: iOS 5 and TLS 1.2 Interoperability Issues". iOS Developer Library. Apple Inc. Retrieved 2012-05-03. https://developer.apple.com/library/ios/technotes/tn2287/
Secure Transport: SSL 2.0 was discontinued in OS X 10.8. SSL 3.0 was discontinued in OS X 10.11 and iOS 9.TLS 1.1, 1.2 and DTLS are available on iOS 5.0 and later, and OS X 10.9 and later."Technical Note TN2287: iOS 5 and TLS 1.2 Interoperability Issues". iOS Developer Library. Apple Inc. Retrieved 2012-05-03. https://developer.apple.com/library/ios/technotes/tn2287/
"@badger: the 1.3 stuff is apparently in iOS 11 and macOS 10.13". 2018-03-09. Retrieved 2018-03-09. https://twitter.com/bagder/status/972234259774820352
"[wolfssl] wolfSSL 3.6.6 Released". 2015-08-20. Retrieved 2015-08-24. http://wolfssl.com/wolfSSL/Blog/Entries/2015/8/24_wolfSSL_3.6.6_is_Now_Available.html
"[wolfssl] wolfSSL 3.13.0 Released". 2017-12-21. Retrieved 2022-01-17. https://www.wolfssl.com/wolfssl-3-13-0-now-available/
"Erlang -- Standards Compliance". https://www.erlang.org/doc/apps/ssl/standards_compliance.html
Since OTP 22
Since OTP 23
Since OTP 22
Since OTP 22
"Erlang OTP SSL application TLS 1.3 compliance table". https://www.erlang.org/doc/apps/ssl/standards_compliance.html#tls-1.3
Since OTP 22
Elgamal, Taher; Hickman, Kipp E. B. (19 April 1995). The SSL Protocol. I-D draft-hickman-netscape-ssl-00. https://datatracker.ietf.org/doc/html/draft-hickman-netscape-ssl-00
RFC 6101. doi:10.17487/RFC6101. https://datatracker.ietf.org/doc/html/rfc6101
RFC 2246. doi:10.17487/RFC2246. https://datatracker.ietf.org/doc/html/rfc2246
RFC 4346. doi:10.17487/RFC4346. https://datatracker.ietf.org/doc/html/rfc4346
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 4347. doi:10.17487/RFC4347. https://datatracker.ietf.org/doc/html/rfc4347
RFC 6347. doi:10.17487/RFC6347. https://datatracker.ietf.org/doc/html/rfc6347
"RSA BSAFE Technical Specification Comparison Tables" (PDF). Archived from the original (PDF) on 2015-09-24. Retrieved 2015-01-09. https://web.archive.org/web/20150924043531/http://www.emc.com/collateral/data-sheet/11433-bsafe-tech-table.pdf
"Security Enhancements in JDK 8". docs.oracle.com. http://docs.oracle.com/javase/8/docs/technotes/guides/security/enhancements-8.html
"Bug 663320 - (NSA-Suite-B-TLS) Implement RFC6460 (NSA Suite B profile for TLS)". Mozilla. Retrieved 2014-05-19. https://bugzilla.mozilla.org/show_bug.cgi?id=663320
"Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.2 [22 Jan 2015]". Archived from the original on September 4, 2014. Retrieved 2015-01-22. https://web.archive.org/web/20140904045720/http://www.openssl.org/news/openssl-1.0.2-notes.html
"rustls implemented and unimplemented features documentation". Retrieved 2024-08-28. https://docs.rs/rustls/0.23.12/rustls/manual/_04_features/index.html
"Introducing Compliance to Suite B Cryptography". 18 September 2012. https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd566200(v=ws.10)
"Speeds and Feeds › Secure or Compliant, Pick One". Archived from the original on December 27, 2013. https://web.archive.org/web/20131227190128/http://veridicalsystems.com/blog/secure-or-compliant-pick-one/
"Search - Cryptographic Module Validation Program - CSRC". csrc.nist.gov. Archived from the original on 2014-12-26. Retrieved 2014-03-18. https://web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm
""Is botan FIPS 140 certified?" Frequently Asked Questions — Botan". Archived from the original on 2014-11-29. Retrieved 2014-11-16. https://web.archive.org/web/20141129042131/http://botan.randombit.net/faq.html?highlight=fips#is-botan-fips-140-certified
"Search - Cryptographic Module Validation Program - CSRC". csrc.nist.gov. 11 October 2016. https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search
"cryptlib". 11 October 2013. Archived from the original on 11 October 2013. https://web.archive.org/web/20131011085917/http://www.cs.auckland.ac.nz/~pgut001/cryptlib/faq.html#Q8
"B.5 Certification". GnuTLS 3.7.7. Retrieved 26 September 2022. https://www.gnutls.org/manual/gnutls.html#Certification
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"Matrix SSL Toolkit" (PDF). http://cdn2.hubspot.net/hub/327778/file-618993629-pdf/Matrix+SSL-3.pdf
"Is mbed TLS FIPS certified? - Mbed TLS documentation". Mbed TLS documentation. https://mbed-tls.readthedocs.io/en/latest/kb/generic/is-mbedtls-fips-certified/
"FIPS Validation - MozillaWiki". wiki.mozilla.org. https://wiki.mozilla.org/FIPS_Validation
with Sun Sparc 5 w/ Sun Solaris v 2.4SE (ITSEC-rated) /wiki/Sparc
with Sun Ultra-5 w/ Sun Trusted Solaris version 2.5.1 (ITSEC-rated) /wiki/Ultra_5/10
with Solaris v8.0 with AdminSuite 3.0.1 as specified in UK IT SEC CC Report No. P148 EAL4 on a SUN SPARC Ultra-1 /wiki/Solaris_(operating_system)
with these platforms; Red Hat Enterprise Linux Version 4 Update 1 AS on IBM xSeries 336 with Intel Xeon CPU, Trusted Solaris 8 4/01 on Sun Blade 2500 Workstation with UltraSPARC IIIi CPU /wiki/Red_Hat_Enterprise_Linux
with these platforms; Red Hat Enterprise Linux v5 running on an IBM System x3550, Red Hat Enterprise Linux v5 running on an HP ProLiant DL145, Sun Solaris 10 5/08 running on a Sun SunBlade 2000 workstation, Sun Solaris 10 5/08 running on a Sun W2100z workstation /wiki/Red_Hat_Enterprise_Linux
"OpenSSL and FIPS 140-2". Archived from the original on 2013-05-28. Retrieved 2014-11-15. https://web.archive.org/web/20130528170840/http://www.openssl.org/docs/fips/fipsnotes.html
"rustls FIPS documentation". Retrieved 2024-08-28.
https://docs.rs/rustls/0.23.12/rustls/manual/_06_fips/index.html
"Microsoft FIPS 140 Validated Cryptographic Modules". https://technet.microsoft.com/en-us/library/security/cc750357.aspx#_Microsoft_FIPS_140
"wolfCrypt FIPS 140-2 Information - wolfSSL Embedded SSL/TLS Library". http://www.wolfssl.com/yaSSL/fips.html
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
GOST 28147-89 Cipher Suites for Transport Layer Security (TLS). I-D draft-chudov-cryptopro-cptls-04. https://datatracker.ietf.org/doc/html/draft-chudov-cryptopro-cptls-04
"[gnutls-devel] GnuTLS 3.4.0 released". 2015-04-08. Retrieved 2015-04-16. http://lists.gnutls.org/pipermail/gnutls-devel/2015-April/007535.html
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"LibreSSL 2.1.2 released". 2014-12-09. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141809396501638
"NSS 3.20 release notes". Mozilla. 2015-08-19. Archived from the original on 2021-12-07. Retrieved 2015-08-20. https://web.archive.org/web/20211207015903/https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20_release_notes
Mozilla.org. "Bug 518787 - Add GOST crypto algorithm support in NSS". Retrieved 2014-07-01. https://bugzilla.mozilla.org/show_bug.cgi?id=518787
Mozilla.org. "Bug 608725 - Add Russian GOST cryptoalgorithms to NSS and Thunderbird". Retrieved 2014-07-01. https://bugzilla.mozilla.org/show_bug.cgi?id=608725
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"OpenSSL: CVS Web Interface". Archived from the original on 2013-04-15. Retrieved 2014-11-12. https://archive.today/20130415122812/http://cvs.openssl.org/fileview?f=openssl%2Fengines%2Fccgost%2FREADME.gost
"rustls implemented and unimplemented features documentation". Retrieved 2024-08-28. https://docs.rs/rustls/0.23.12/rustls/manual/_04_features/index.html
"rustls implemented and unimplemented features documentation". Retrieved 2024-08-28. https://docs.rs/rustls/0.23.12/rustls/manual/_04_features/index.html
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
"Microsoft Security Advisory 3174644". 14 October 2022. https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/3174644
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
"Microsoft Security Bulletin MS14-066 - Critical (Section Update FAQ)". Microsoft. November 11, 2014. Retrieved 11 November 2014. https://technet.microsoft.com/library/security/MS14-066#ID0E5MAC
Thomlinson, Matt (November 11, 2014). "Hundreds of Millions of Microsoft Customers Now Benefit from Best-in-Class Encryption". Microsoft Security. Retrieved 11 November 2014. http://blogs.microsoft.com/cybertrust/2014/11/11/hundreds-of-millions-of-microsoft-customers-now-benefit-from-best-in-class-encryption/
"Update adds new TLS cipher suites and changes cipher suite priorities in Windows 8.1 and Windows Server 2012 R2". support.microsoft.com. https://support.microsoft.com/en-us/topic/update-adds-new-tls-cipher-suites-and-changes-cipher-suite-priorities-in-windows-8-1-and-windows-server-2012-r2-8e395e43-c8ef-27d8-b60c-0fc57d526d94
"Microsoft Security Advisory 3174644". 14 October 2022. https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/3174644
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
"Microsoft Security Advisory 3174644". 14 October 2022. https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/3174644
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
"Microsoft Security Advisory 3174644". 14 October 2022. https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/3174644
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
GOST 28147-89 Cipher Suites for Transport Layer Security (TLS). I-D draft-chudov-cryptopro-cptls-04. https://datatracker.ietf.org/doc/html/draft-chudov-cryptopro-cptls-04
RFC 5054. doi:10.17487/RFC5054. https://datatracker.ietf.org/doc/html/rfc5054
RFC 5054. doi:10.17487/RFC5054. https://datatracker.ietf.org/doc/html/rfc5054
RFC 5054. doi:10.17487/RFC5054. https://datatracker.ietf.org/doc/html/rfc5054
RFC 4279. doi:10.17487/RFC4279. https://datatracker.ietf.org/doc/html/rfc4279
RFC 4279. doi:10.17487/RFC4279. https://datatracker.ietf.org/doc/html/rfc4279
RFC 4279. doi:10.17487/RFC4279. https://datatracker.ietf.org/doc/html/rfc4279
RFC 5489. doi:10.17487/RFC5489. https://datatracker.ietf.org/doc/html/rfc5489
RFC 2712. doi:10.17487/RFC2712. https://datatracker.ietf.org/doc/html/rfc2712
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
"RSA BSAFE SSL-J 6.2.4 Release Notes". 2018-09-05. Archived from the original on 2018-09-10. https://web.archive.org/web/20180910204318/https://community.rsa.com/docs/DOC-95884
"LibreSSL 2.0.4 released". Retrieved 2014-08-04. https://marc.info/?l=openbsd-tech&m=140710904403657
"LibreSSL 2.0.4 released". Retrieved 2014-08-04. https://marc.info/?l=openbsd-tech&m=140710904403657
"LibreSSL 2.0.4 released". Retrieved 2014-08-04. https://marc.info/?l=openbsd-tech&m=140710904403657
"Bug 405155 - add support for TLS-SRP, rfc5054". Mozilla. Retrieved 2014-01-25. https://bugzilla.mozilla.org/show_bug.cgi?id=405155
"Bug 405155 - add support for TLS-SRP, rfc5054". Mozilla. Retrieved 2014-01-25. https://bugzilla.mozilla.org/show_bug.cgi?id=405155
"Bug 405155 - add support for TLS-SRP, rfc5054". Mozilla. Retrieved 2014-01-25. https://bugzilla.mozilla.org/show_bug.cgi?id=405155
"Bug 306435 - Mozilla browsers should support the new IETF TLS-PSK protocol to help reduce phishing". Mozilla. Retrieved 2014-01-25. https://bugzilla.mozilla.org/show_bug.cgi?id6435
"Bug 306435 - Mozilla browsers should support the new IETF TLS-PSK protocol to help reduce phishing". Mozilla. Retrieved 2014-01-25. https://bugzilla.mozilla.org/show_bug.cgi?id6435
"Bug 306435 - Mozilla browsers should support the new IETF TLS-PSK protocol to help reduce phishing". Mozilla. Retrieved 2014-01-25. https://bugzilla.mozilla.org/show_bug.cgi?id6435
"Bug 306435 - Mozilla browsers should support the new IETF TLS-PSK protocol to help reduce phishing". Mozilla. Retrieved 2014-01-25. https://bugzilla.mozilla.org/show_bug.cgi?id6435
"Bug 1170510 - Implement NSS server side support for DH_anon". Mozilla. Retrieved 2015-06-03. https://bugzilla.mozilla.org/show_bug.cgi?id=1170510
"Bug 236245 - Update ECC/TLS to conform to RFC 4492". Mozilla. Retrieved 2014-06-09. https://bugzilla.mozilla.org/show_bug.cgi?id=236245
"Changes between 0.9.6h and 0.9.7 [31 Dec 2002]". Retrieved 2016-01-29. https://www.openssl.org/news/changelog.html#x58
"Changes between 0.9.8n and 1.0.0 [29 Mar 2010]". Retrieved 2016-01-29. https://www.openssl.org/news/changelog.html#x29
"Changes between 0.9.8n and 1.0.0 [29 Mar 2010]". Retrieved 2016-01-29. https://www.openssl.org/news/changelog.html#x29
"wolfSSL (Formerly CyaSSL) Release 3.9.0 (03/18/2016)". 2016-03-18. Retrieved 2016-04-05. https://www.wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
RFC 5054. doi:10.17487/RFC5054. https://datatracker.ietf.org/doc/html/rfc5054
RFC 5054. doi:10.17487/RFC5054. https://datatracker.ietf.org/doc/html/rfc5054
RFC 5054. doi:10.17487/RFC5054. https://datatracker.ietf.org/doc/html/rfc5054
RFC 4279. doi:10.17487/RFC4279. https://datatracker.ietf.org/doc/html/rfc4279
RFC 4279. doi:10.17487/RFC4279. https://datatracker.ietf.org/doc/html/rfc4279
RFC 4279. doi:10.17487/RFC4279. https://datatracker.ietf.org/doc/html/rfc4279
RFC 5489. doi:10.17487/RFC5489. https://datatracker.ietf.org/doc/html/rfc5489
RFC 2712. doi:10.17487/RFC2712. https://datatracker.ietf.org/doc/html/rfc2712
RFC 5246. doi:10.17487/RFC5246. https://datatracker.ietf.org/doc/html/rfc5246
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 5280. doi:10.17487/RFC5280. https://datatracker.ietf.org/doc/html/rfc5280
RFC 3280. doi:10.17487/RFC3280. https://datatracker.ietf.org/doc/html/rfc3280
RFC 2560. doi:10.17487/RFC2560. https://datatracker.ietf.org/doc/html/rfc2560
RFC 6698. doi:10.17487/RFC6698. https://datatracker.ietf.org/doc/html/rfc6698
RFC 7218. doi:10.17487/RFC7218. https://datatracker.ietf.org/doc/html/rfc7218
Laurie, B.; Langley, A.; Kasper, E. (June 2013). Certificate Transparency. IETF. doi:10.17487/RFC6962. ISSN 2070-1721. RFC 6962. Retrieved 2020-08-31. /wiki/Ben_Laurie
"MatrixSSL 3.8.3". Archived from the original on 2017-01-19. Retrieved 2017-01-18. https://web.archive.org/web/20170119052959/http://www.matrixssl.org/blog/releases/matrixssl_3_8_3
"mbed TLS 2.0 defaults implement best practices". Retrieved 2017-01-18. https://tls.mbed.org/tech-updates/blog/mbedtls-2.0-defaults-best-practices
"Bug 672600 - Use DNSSEC/DANE chain stapled into TLS handshake in certificate chain validation". Mozilla. Retrieved 2014-06-18. https://bugzilla.mozilla.org/show_bug.cgi?id=672600
"CRL Validation · Issue #3499 · aws/s2n-tls". GitHub. Retrieved 2022-11-01. https://github.com/aws/s2n-tls/issues/3499
"OCSP digest support for SHA-256 · Issue #2854 · aws/s2n-tls · GitHub". GitHub. Retrieved 2022-11-01. https://github.com/aws/s2n-tls/issues/2854
"[RFC 6962] s2n Client can Validate Signed Certificate Timestamp TLS Extension · Issue #457 · aws/s2n-tls · GitHub". GitHub. Retrieved 2022-11-01. https://github.com/aws/s2n-tls/issues/457
"How Certificate Revocation Works". Microsoft TechNet. Microsoft. March 16, 2012. Retrieved July 10, 2013. https://technet.microsoft.com/en-us/library/ee619754(WS.10).aspx
"How Certificate Revocation Works". Microsoft TechNet. Microsoft. March 16, 2012. Retrieved July 10, 2013. https://technet.microsoft.com/en-us/library/ee619754(WS.10).aspx
RFC 5288. doi:10.17487/RFC5288.
RFC 5289. doi:10.17487/RFC5289.
https://datatracker.ietf.org/doc/html/rfc5288
RFC 6655, RFC 7251
RFC 6367. doi:10.17487/RFC6367. https://datatracker.ietf.org/doc/html/rfc6367
RFC 5932. doi:10.17487/RFC5932. https://datatracker.ietf.org/doc/html/rfc5932
RFC 6367. doi:10.17487/RFC6367. https://datatracker.ietf.org/doc/html/rfc6367
RFC 6209. doi:10.17487/RFC6209. https://datatracker.ietf.org/doc/html/rfc6209
RFC 6209. doi:10.17487/RFC6209. https://datatracker.ietf.org/doc/html/rfc6209
RFC 4162. doi:10.17487/RFC4162. https://datatracker.ietf.org/doc/html/rfc4162
"Sweet32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN". sweet32.info. https://sweet32.info/
GOST 28147-89 Cipher Suites for Transport Layer Security (TLS). I-D draft-chudov-cryptopro-cptls-04. https://datatracker.ietf.org/doc/html/draft-chudov-cryptopro-cptls-04
This algorithm is not defined yet as TLS cipher suites in RFCs, is proposed in drafts.
RFC 7905. doi:10.17487/RFC7905. https://datatracker.ietf.org/doc/html/rfc7905
authentication only, no encryption
"Version 1.11.12, 2015-01-02 — Botan". 2015-01-02. Retrieved 2015-01-09. http://botan.randombit.net/relnotes/1_11_12.html
"[gnutls-devel] GnuTLS 3.4.0 released". 2015-04-08. Retrieved 2015-04-16. http://lists.gnutls.org/pipermail/gnutls-devel/2015-April/007535.html
"gnutls 3.6.0". 2017-09-21. Retrieved 2018-01-07. https://lwn.net/Articles/731694/
"gnutls 3.4.12". 2016-05-20. Archived from the original on 2016-10-13. Retrieved 2016-05-29. https://web.archive.org/web/20161013015630/http://permalink.gmane.org/gmane.network.gnutls.general/4131
"Java SE DevelopmentK Kit 10 - 10.0.1 Release Notes". 2018-04-17. Retrieved 2024-01-14. https://www.oracle.com/java/technologies/javase/10-0-1-relnotes.html
"JDK 12 Release Notes". Retrieved 2024-01-14. https://www.oracle.com/java/technologies/javase/12-relnote-issues.html
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"LibreSSL 2.1.2 released". 2014-12-09. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141809396501638
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"LibreSSL 2.1.2 released". 2014-12-09. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141809396501638
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"Changes in 3.8.3". GitHub. Retrieved 2016-06-19.[permanent dead link] https://github.com/matrixssl/matrixssl/blob/master/CHANGES.md#changes-in-383
"PolarSSL 1.3.8 release notes". Archived from the original on 2014-07-14. https://web.archive.org/web/20140714220749/https://polarssl.org/tech-updates/releases/polarssl-1.3.8-released
"Mbed TLS 2.11.0, 2.7.4 and 2.1.13 released". Retrieved 2018-08-30. https://tls.mbed.org/tech-updates/releases/mbedtls-2.11.0-2.7.4-and-2.1.13-released
"Mbed TLS 2.11.0, 2.7.4 and 2.1.13 released". Retrieved 2018-08-30. https://tls.mbed.org/tech-updates/releases/mbedtls-2.11.0-2.7.4-and-2.1.13-released
"Mbed TLS 3.0.0 branch released". GitHub. 2021-07-07. Retrieved 2021-08-13. https://github.com/ARMmbed/mbedtls/blob/93a3ca6caf20e0e1a90c86ee2fc03e9f1fb4ebfa/ChangeLog
"Mbed TLS 2.12.0, 2.7.5 and 2.1.14 released". Retrieved 2018-08-30. https://tls.mbed.org/tech-updates/releases/mbedtls-2.12.0-2.7.5-and-2.1.14-released
"NSS 3.25 release notes". Mozilla Developer Network. Mozilla. Archived from the original on 2021-12-07. Retrieved 2016-07-01. https://web.archive.org/web/20211207020401/https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.25_release_notes
"Bug 940119 - libssl does not support any TLS_ECDHE_*_CAMELLIA_*_GCM cipher suites". Mozilla. Retrieved 2013-11-19. https://bugzilla.mozilla.org/show_bug.cgi?id=940119
This algorithm is implemented in an NSS fork used by Pale Moon. /wiki/Fork_(software_development)
"NSS 3.12 is released". Retrieved 2013-11-19. https://groups.google.com/forum/?hl=ja#!searchin/mozilla.dev.tech.crypto/camellia/mozilla.dev.tech.crypto/3NTvSYkF9MQ/O7Aj7oeiff8J
"NSS 3.12.3 Release Notes". Mozilla Developer Network. Mozilla. Archived from the original on 2023-04-02. Retrieved 2023-04-01. https://web.archive.org/web/20230402220534/https://firefox-source-docs.mozilla.org/security/nss/legacy/nss_releases/nss_3.12.3_release_notes/index.html
Mozilla.org. "Bug 518787 - Add GOST crypto algorithm support in NSS". Retrieved 2014-07-01. https://bugzilla.mozilla.org/show_bug.cgi?id=518787
Mozilla.org. "Bug 608725 - Add Russian GOST cryptoalgorithms to NSS and Thunderbird". Retrieved 2014-07-01. https://bugzilla.mozilla.org/show_bug.cgi?id=608725
"NSS 3.23 release notes". Mozilla Developer Network. Mozilla. Archived from the original on 2021-04-14. Retrieved 2016-03-09. https://web.archive.org/web/20210414233905/https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes
"openssl/CHANGES at OpenSSL_1_0_1-stable · openssl/openssl". GitHub. Retrieved 2015-01-20. https://github.com/openssl/openssl/blob/OpenSSL_1_0_1-stable/CHANGES
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"OpenSSL 1.1.1 Series Release Notes". www.openssl.org. Archived from the original on 2024-01-16. https://web.archive.org/web/20240116202037/https://www.openssl.org/news/openssl-1.1.1-notes.html
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"OpenSSL: CVS Web Interface". Archived from the original on 2013-04-15. Retrieved 2014-11-12. https://archive.today/20130415122812/http://cvs.openssl.org/fileview?f=openssl%2Fengines%2Fccgost%2FREADME.gost
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"rustls implemented and unimplemented features documentation". Retrieved 2024-08-28. https://docs.rs/rustls/0.23.12/rustls/manual/_04_features/index.html
"rustls implemented and unimplemented features documentation". Retrieved 2024-08-28. https://docs.rs/rustls/0.23.12/rustls/manual/_04_features/index.html
"Cipher Suites in TLS/SSL (Schannel SSP) - Win32 apps". docs.microsoft.com. 14 July 2023. https://docs.microsoft.com/en-us/windows/win32/secauthn/cipher-suites-in-schannel
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
"Microsoft Security Bulletin MS14-066 - Critical (Section Update FAQ)". Microsoft. November 11, 2014. Retrieved 11 November 2014. https://technet.microsoft.com/library/security/MS14-066#ID0E5MAC
Thomlinson, Matt (November 11, 2014). "Hundreds of Millions of Microsoft Customers Now Benefit from Best-in-Class Encryption". Microsoft Security. Retrieved 11 November 2014. http://blogs.microsoft.com/cybertrust/2014/11/11/hundreds-of-millions-of-microsoft-customers-now-benefit-from-best-in-class-encryption/
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
"Qualys SSL Labs - Projects / User Agent Capabilities: IE 11 / Win 10 Preview". dev.ssllabs.com. Archived from the original on 2023-07-14. https://web.archive.org/web/20230714075523/https://dev.ssllabs.com/ssltest/viewClient.html?name=IE&version=11&platform=Win+10+Preview
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
RFC 5288. doi:10.17487/RFC5288.
RFC 5289. doi:10.17487/RFC5289.
https://datatracker.ietf.org/doc/html/rfc5288
RFC 6655, RFC 7251
RFC 6367. doi:10.17487/RFC6367. https://datatracker.ietf.org/doc/html/rfc6367
RFC 5932. doi:10.17487/RFC5932. https://datatracker.ietf.org/doc/html/rfc5932
RFC 6367. doi:10.17487/RFC6367. https://datatracker.ietf.org/doc/html/rfc6367
RFC 6209. doi:10.17487/RFC6209. https://datatracker.ietf.org/doc/html/rfc6209
RFC 6209. doi:10.17487/RFC6209. https://datatracker.ietf.org/doc/html/rfc6209
RFC 4162. doi:10.17487/RFC4162. https://datatracker.ietf.org/doc/html/rfc4162
"Sweet32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN". sweet32.info. https://sweet32.info/
GOST 28147-89 Cipher Suites for Transport Layer Security (TLS). I-D draft-chudov-cryptopro-cptls-04. https://datatracker.ietf.org/doc/html/draft-chudov-cryptopro-cptls-04
This algorithm is not defined yet as TLS cipher suites in RFCs, is proposed in drafts.
RFC 7905. doi:10.17487/RFC7905. https://datatracker.ietf.org/doc/html/rfc7905
authentication only, no encryption
IDEA and DES have been removed from TLS 1.2.[152]
"Sweet32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN". https://sweet32.info
IDEA and DES have been removed from TLS 1.2.[152]
40 bits strength of cipher suites were designed to operate at reduced key lengths in order to comply with US regulations about the export of cryptographic software containing certain strong encryption algorithms (see Export of cryptography from the United States). These weak suites are forbidden in TLS 1.1 and later. /wiki/Export_of_cryptography_from_the_United_States
40 bits strength of cipher suites were designed to operate at reduced key lengths in order to comply with US regulations about the export of cryptographic software containing certain strong encryption algorithms (see Export of cryptography from the United States). These weak suites are forbidden in TLS 1.1 and later. /wiki/Export_of_cryptography_from_the_United_States
The RC4 attacks weaken or break RC4 used in SSL/TLS. Use of RC4 is prohibited by RFC 7465. /wiki/Transport_Layer_Security#RC4_attacks
The RC4 attacks weaken or break RC4 used in SSL/TLS. /wiki/Transport_Layer_Security#RC4_attacks
40 bits strength of cipher suites were designed to operate at reduced key lengths in order to comply with US regulations about the export of cryptographic software containing certain strong encryption algorithms (see Export of cryptography from the United States). These weak suites are forbidden in TLS 1.1 and later. /wiki/Export_of_cryptography_from_the_United_States
"Version 1.11.15, 2015-03-08 — Botan". 2015-03-08. Retrieved 2015-03-11. http://botan.randombit.net/relnotes/1_11_15.html
"[gnutls-devel] GnuTLS 3.4.0 released". 2015-04-08. Retrieved 2015-04-16. http://lists.gnutls.org/pipermail/gnutls-devel/2015-April/007535.html
"Java Cryptography Architecture Oracle Providers Documentation". docs.oracle.com. http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"mbed TLS 2.0.0 released". 2015-07-10. Retrieved 2015-07-14. https://tls.mbed.org/tech-updates/releases/mbedtls-2.0.0-released
"NSS 3.15.3 release notes". Mozilla Developer Network. Mozilla. Archived from the original on 2014-06-05. Retrieved 2014-07-13. https://web.archive.org/web/20140605001016/https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.15.3_release_notes
"MFSA 2013-103: Miscellaneous Network Security Services (NSS) vulnerabilities". Mozilla. Retrieved 2014-07-13. https://www.mozilla.org/security/announce/2013/mfsa2013-103.html
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"RC4 is now disabled in Microsoft Edge and Internet Explorer 11 - Microsoft Edge Dev BlogMicrosoft Edge Dev Blog". blogs.windows.com. 2016-08-09. https://blogs.windows.com/msedgedev/2016/08/09/rc4-now-deprecated/
"RC4 is now disabled in Microsoft Edge and Internet Explorer 11 - Microsoft Edge Dev BlogMicrosoft Edge Dev Blog". blogs.windows.com. 2016-08-09. https://blogs.windows.com/msedgedev/2016/08/09/rc4-now-deprecated/
"Qualys SSL Labs - Projects / User Agent Capabilities: IE 11 / Win 10 Preview". dev.ssllabs.com. Archived from the original on 2023-07-14. https://web.archive.org/web/20230714075523/https://dev.ssllabs.com/ssltest/viewClient.html?name=IE&version=11&platform=Win+10+Preview
"RC4 is now disabled in Microsoft Edge and Internet Explorer 11 - Microsoft Edge Dev BlogMicrosoft Edge Dev Blog". blogs.windows.com. 2016-08-09. https://blogs.windows.com/msedgedev/2016/08/09/rc4-now-deprecated/
"wolfSSL (Formerly CyaSSL) Release 3.7.0 (10/26/2015)". 2015-10-26. Retrieved 2015-11-19. https://www.wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
IDEA and DES have been removed from TLS 1.2.[152]
"Sweet32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN". https://sweet32.info
IDEA and DES have been removed from TLS 1.2.[152]
40 bits strength of cipher suites were designed to operate at reduced key lengths in order to comply with US regulations about the export of cryptographic software containing certain strong encryption algorithms (see Export of cryptography from the United States). These weak suites are forbidden in TLS 1.1 and later. /wiki/Export_of_cryptography_from_the_United_States
40 bits strength of cipher suites were designed to operate at reduced key lengths in order to comply with US regulations about the export of cryptographic software containing certain strong encryption algorithms (see Export of cryptography from the United States). These weak suites are forbidden in TLS 1.1 and later. /wiki/Export_of_cryptography_from_the_United_States
The RC4 attacks weaken or break RC4 used in SSL/TLS. Use of RC4 is prohibited by RFC 7465. /wiki/Transport_Layer_Security#RC4_attacks
The RC4 attacks weaken or break RC4 used in SSL/TLS. /wiki/Transport_Layer_Security#RC4_attacks
40 bits strength of cipher suites were designed to operate at reduced key lengths in order to comply with US regulations about the export of cryptographic software containing certain strong encryption algorithms (see Export of cryptography from the United States). These weak suites are forbidden in TLS 1.1 and later. /wiki/Export_of_cryptography_from_the_United_States
RFC 8446
RFC 8422
RFC 8446
RFC 8422
RFC 8446
RFC 8422
RFC 8446
RFC 8422
RFC 8446
RFC 8422
RFC 7027
RFC 7027
RFC 7027
"Version 1.11.12, 2015-01-02 — Botan". 2015-01-02. Retrieved 2015-01-09. http://botan.randombit.net/relnotes/1_11_12.html
"Version 1.11.5, 2013-11-10 — Botan". 2013-11-10. Retrieved 2015-01-23. http://botan.randombit.net/relnotes/1_11_5.html
"Version 1.11.5, 2013-11-10 — Botan". 2013-11-10. Retrieved 2015-01-23. http://botan.randombit.net/relnotes/1_11_5.html
"Version 1.11.5, 2013-11-10 — Botan". 2013-11-10. Retrieved 2015-01-23. http://botan.randombit.net/relnotes/1_11_5.html
"An overview of the new features in GnuTLS 3.5.0". 2016-05-02. Retrieved 2016-12-09. http://nmav.gnutls.org/2016/05/gnutls-3-5-0.html
"gnutls 3.6.12". 2020-02-01. Retrieved 2021-08-31. https://lists.gnupg.org/pipermail/gnutls-help/2020-February/004621.html
"JDK 13 Early-Access Release Notes". Archived from the original on 2020-04-01. Retrieved 2019-06-20. https://web.archive.org/web/20200401060808/http://jdk.java.net/13/release-notes
"JEP 339: Edwards-Curve Digital Signature Algorithm (EdDSA)". Retrieved 2024-01-14. https://bugs.openjdk.org/browse/JDK-8199231
"JDK 13 Early-Access Release Notes". Archived from the original on 2020-04-01. Retrieved 2019-06-20. https://web.archive.org/web/20200401060808/http://jdk.java.net/13/release-notes
"JEP 339: Edwards-Curve Digital Signature Algorithm (EdDSA)". Retrieved 2024-01-14. https://bugs.openjdk.org/browse/JDK-8199231
"LibreSSL 2.5.1 release notes". OpenBSD. 2017-01-31. Retrieved 2017-02-23. https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.5.1-relnotes.txt
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
"MatrixSSL 4.0 changelog". GitHub. Retrieved 2018-09-18. https://github.com/matrixssl/matrixssl/blob/4-0-0-open/doc/CHANGES_v4.0.md
"PolarSSL 1.3.3 released". 2013-12-31. Archived from the original on 2014-01-07. Retrieved 2015-01-23. https://web.archive.org/web/20140107122023/https://polarssl.org/tech-updates/releases/polarssl-1.3.3-released
"Mbed TLS 2.9.0, 2.7.3 and 2.1.12 released". Retrieved 2018-08-30. https://tls.mbed.org/tech-updates/releases/mbedtls-2.9.0-2.7.3-and-2.1.12-released
"PolarSSL 1.3.1 released". 2013-10-15. Archived from the original on 2015-01-23. Retrieved 2015-01-23. https://web.archive.org/web/20150123084424/https://polarssl.org/tech-updates/releases/polarssl-1.3.1-released
"PolarSSL 1.3.1 released". 2013-10-15. Archived from the original on 2015-01-23. Retrieved 2015-01-23. https://web.archive.org/web/20150123084424/https://polarssl.org/tech-updates/releases/polarssl-1.3.1-released
"PolarSSL 1.3.1 released". 2013-10-15. Archived from the original on 2015-01-23. Retrieved 2015-01-23. https://web.archive.org/web/20150123084424/https://polarssl.org/tech-updates/releases/polarssl-1.3.1-released
"Bug 957105 - Add support for curve25519 Key Exchange and UMAC MAC support for TLS". Mozilla. Retrieved 2017-02-23. https://bugzilla.mozilla.org/show_bug.cgi?id=957105
"Bug 1305243 - Support for X448". Mozilla. Retrieved 2022-08-04. https://bugzilla.mozilla.org/show_bug.cgi?id=1305243
"Bug 1597057 - Curve448 or named Ed448-Goldilocks support needed (both X448 key exchange and Ed448 signature algorithm )". Mozilla. Retrieved 2022-08-04. https://bugzilla.mozilla.org/show_bug.cgi?id=1597057
"Bug 943639 - Support for Brainpool ECC Curve (rfc5639)". Mozilla. Retrieved 2014-01-25. https://bugzilla.mozilla.org/show_bug.cgi?id=943639
"Bug 943639 - Support for Brainpool ECC Curve (rfc5639)". Mozilla. Retrieved 2014-01-25. https://bugzilla.mozilla.org/show_bug.cgi?id=943639
"Bug 943639 - Support for Brainpool ECC Curve (rfc5639)". Mozilla. Retrieved 2014-01-25. https://bugzilla.mozilla.org/show_bug.cgi?id=943639
"OpenSSL 1.1.0x Release Notes". 25 August 2016. Archived from the original on 18 May 2018. Retrieved 18 May 2018. https://web.archive.org/web/20180518200620/https://www.openssl.org/news/cl110.txt
"OpenSSL GitHub Issue #487 Tracker". GitHub. 2 December 2015. Retrieved 18 May 2018. https://github.com/openssl/openssl/issues/487
"OpenSSL CHANGES". 1 May 2018. Archived from the original on 18 May 2018. Retrieved 18 May 2018. https://web.archive.org/web/20180518200747/https://www.openssl.org/news/cl111.txt
"OpenSSL GitHub Issue #5049 Tracker". GitHub. 9 January 2018. Retrieved 18 May 2018. https://github.com/openssl/openssl/issues/5049
"Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.2 [22 Jan 2015]". Archived from the original on September 4, 2014. Retrieved 2015-01-22. https://web.archive.org/web/20140904045720/http://www.openssl.org/news/openssl-1.0.2-notes.html
"Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.2 [22 Jan 2015]". Archived from the original on September 4, 2014. Retrieved 2015-01-22. https://web.archive.org/web/20140904045720/http://www.openssl.org/news/openssl-1.0.2-notes.html
"Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.2 [22 Jan 2015]". Archived from the original on September 4, 2014. Retrieved 2015-01-22. https://web.archive.org/web/20140904045720/http://www.openssl.org/news/openssl-1.0.2-notes.html
"wolfSSL (Formerly CyaSSL) Release 3.4.6 (03/30/2015)". 2015-03-30. Retrieved 2015-11-19. https://www.wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
"wolfSSL Release 4.4.0 (04/22/2020)". 2020-04-22. Retrieved 2022-10-18. https://www.wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
Negotiation of arbitrary curves has been shown to be insecure for certain curve sizes Mavrogiannopoulos, Nikos and Vercautern, Frederik and Velichkov, Vesselin and Preneel, Bart (2012). "A cross-protocol attack on the TLS protocol" (PDF). Proceedings of the 2012 ACM conference on Computer and communications security. Association for Computing Machinery. pp. 62–72. doi:10.1145/2382196.2382206. ISBN 978-1-4503-1651-4.{{cite conference}}: CS1 maint: multiple names: authors list (link) 978-1-4503-1651-4
RFC 4492. doi:10.17487/RFC4492. https://datatracker.ietf.org/doc/html/rfc4492
Negotiation of arbitrary curves has been shown to be insecure for certain curve sizes Mavrogiannopoulos, Nikos and Vercautern, Frederik and Velichkov, Vesselin and Preneel, Bart (2012). "A cross-protocol attack on the TLS protocol" (PDF). Proceedings of the 2012 ACM conference on Computer and communications security. Association for Computing Machinery. pp. 62–72. doi:10.1145/2382196.2382206. ISBN 978-1-4503-1651-4.{{cite conference}}: CS1 maint: multiple names: authors list (link) 978-1-4503-1651-4
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[183]
These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[184]
GOST 28147-89 Cipher Suites for Transport Layer Security (TLS). I-D draft-chudov-cryptopro-cptls-04. https://datatracker.ietf.org/doc/html/draft-chudov-cryptopro-cptls-04
GOST 28147-89 Cipher Suites for Transport Layer Security (TLS). I-D draft-chudov-cryptopro-cptls-04. https://datatracker.ietf.org/doc/html/draft-chudov-cryptopro-cptls-04
"LibreSSL 2.1.2 released". 2014-12-09. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141809396501638
"LibreSSL 2.1.2 released". 2014-12-09. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141809396501638
Mozilla.org. "Bug 518787 - Add GOST crypto algorithm support in NSS". Retrieved 2014-07-01. https://bugzilla.mozilla.org/show_bug.cgi?id=518787
Mozilla.org. "Bug 608725 - Add Russian GOST cryptoalgorithms to NSS and Thunderbird". Retrieved 2014-07-01. https://bugzilla.mozilla.org/show_bug.cgi?id=608725
Mozilla.org. "Bug 518787 - Add GOST crypto algorithm support in NSS". Retrieved 2014-07-01. https://bugzilla.mozilla.org/show_bug.cgi?id=518787
Mozilla.org. "Bug 608725 - Add Russian GOST cryptoalgorithms to NSS and Thunderbird". Retrieved 2014-07-01. https://bugzilla.mozilla.org/show_bug.cgi?id=608725
"OpenSSL: CVS Web Interface". Archived from the original on 2013-04-15. Retrieved 2014-11-12. https://archive.today/20130415122812/http://cvs.openssl.org/fileview?f=openssl%2Fengines%2Fccgost%2FREADME.gost
"OpenSSL: CVS Web Interface". Archived from the original on 2013-04-15. Retrieved 2014-11-12. https://archive.today/20130415122812/http://cvs.openssl.org/fileview?f=openssl%2Fengines%2Fccgost%2FREADME.gost
"SHA2 and Windows". Retrieved 2024-12-25. https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/sha2-and-windows/1128617
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
"Microsoft Security Bulletin MS14-066 - Critical (Section Update FAQ)". Microsoft. November 11, 2014. Retrieved 11 November 2014. https://technet.microsoft.com/library/security/MS14-066#ID0E5MAC
Thomlinson, Matt (November 11, 2014). "Hundreds of Millions of Microsoft Customers Now Benefit from Best-in-Class Encryption". Microsoft Security. Retrieved 11 November 2014. http://blogs.microsoft.com/cybertrust/2014/11/11/hundreds-of-millions-of-microsoft-customers-now-benefit-from-best-in-class-encryption/
"Update adds new TLS cipher suites and changes cipher suite priorities in Windows 8.1 and Windows Server 2012 R2". support.microsoft.com. https://support.microsoft.com/en-us/topic/update-adds-new-tls-cipher-suites-and-changes-cipher-suite-priorities-in-windows-8-1-and-windows-server-2012-r2-8e395e43-c8ef-27d8-b60c-0fc57d526d94
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
"Qualys SSL Labs - Projects / User Agent Capabilities: IE 11 / Win 10 Preview". dev.ssllabs.com. Archived from the original on 2023-07-14. https://web.archive.org/web/20230714075523/https://dev.ssllabs.com/ssltest/viewClient.html?name=IE&version=11&platform=Win+10+Preview
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
Extensions to support GOST in Schannel might be available.[citation needed] /wiki/Wikipedia:Citation_needed
RFC 3749
"RSA BSAFE Technical Specification Comparison Tables" (PDF). Archived from the original (PDF) on 2015-09-24. Retrieved 2015-01-09. https://web.archive.org/web/20150924043531/http://www.emc.com/collateral/data-sheet/11433-bsafe-tech-table.pdf
"OpenBSD 5.6 Released". 2014-11-01. Retrieved 2015-01-20. https://marc.info/?l=openbsd-announce&m=141486254309079
RFC 5746
RFC 6066
RFC 7301
RFC 6066
RFC 6091
RFC 4680
RFC 5077. doi:10.17487/RFC5077. https://datatracker.ietf.org/doc/html/rfc5077
RFC 5705. doi:10.17487/RFC5705. https://datatracker.ietf.org/doc/html/rfc5705
RFC 6066
Encrypt-then-MAC for Transport Layer Security (TLS) and Datagram Transport Layer Security. doi:10.17487/RFC7366. RFC 7366. https://datatracker.ietf.org/doc/html/rfc7366
RFC 7507. doi:10.17487/RFC7507. https://datatracker.ietf.org/doc/html/rfc7507
RFC 7627
RFC 7685
RFC 7250
"Version 1.11.16, 2015-03-29 — Botan". 2016-03-29. Retrieved 2016-09-08. https://botan.randombit.net/news.html#version-1-11-16-2015-03-29
"Version 1.11.10, 2014-12-10 — Botan". 2014-12-10. Retrieved 2014-12-14. http://botan.randombit.net/relnotes/1_11_10.html
"Version 1.11.26, 2016-01-04 — Botan". 2016-01-04. Retrieved 2016-02-25. http://botan.randombit.net/news.html#version-1-11-26-2016-01-04
Present, but disabled by default due to lack of use by any implementation.
"gnutls 3.2.0". Archived from the original on 2016-01-31. Retrieved 2015-01-26. https://web.archive.org/web/20160131230710/http://article.gmane.org/gmane.network.gnutls.general/3136
Mavrogiannopoulos, Nikos (August 21, 2017). "[gnutls-help] GnuTLS 3.6.0 released". https://lists.gnupg.org/pipermail/gnutls-help/2017-August/004364.html
"[gnutls-devel] GnuTLS 3.4.0 released". 2015-04-08. Retrieved 2015-04-16. http://lists.gnutls.org/pipermail/gnutls-devel/2015-April/007535.html
"gnutls 3.4.4". Archived from the original on 2017-07-17. Retrieved 2015-08-25. https://web.archive.org/web/20170717020648/http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/8267
"[gnutls-devel] GnuTLS 3.4.0 released". 2015-04-08. Retrieved 2015-04-16. http://lists.gnutls.org/pipermail/gnutls-devel/2015-April/007535.html
"%DUMBFW priority keyword". Retrieved 2017-04-30. https://gnutls.org/manual/html_node/Priority-Strings.html
"gnutls 3.6.6". 2019-01-25. Retrieved 2019-09-01. https://lists.gnupg.org/pipermail/gnutls-help/2019-January/004484.html
"Security Enhancements in JDK 8". docs.oracle.com. http://docs.oracle.com/javase/8/docs/technotes/guides/security/enhancements-8.html
"Security Enhancements in JDK 8". docs.oracle.com. http://docs.oracle.com/javase/8/docs/technotes/guides/security/enhancements-8.html
"LibreSSL 2.1.3 released". 2015-01-22. Retrieved 2015-01-22. https://marc.info/?l=openbsd-announce&m=142193407304782
"LibreSSL 2.1.4 released". 2015-03-04. Retrieved 2015-03-04. https://marc.info/?l=openbsd-announce&m=142543818707898
"MatrixSSL - News". 2014-12-04. Archived from the original on 2015-02-14. Retrieved 2015-01-26. https://web.archive.org/web/20150214105056/http://www.matrixssl.org/news.html
"Changes in 3.8.3". GitHub. Retrieved 2016-06-19.[permanent dead link] https://github.com/matrixssl/matrixssl/blob/master/CHANGES.md#changes-in-383
"Changes in 3.8.3". GitHub. Retrieved 2016-06-19.[permanent dead link] https://github.com/matrixssl/matrixssl/blob/master/CHANGES.md#changes-in-383
"Changes in 3.8.3". GitHub. Retrieved 2016-06-19.[permanent dead link] https://github.com/matrixssl/matrixssl/blob/master/CHANGES.md#changes-in-383
"Download overview - PolarSSL". 2014-04-11. Archived from the original on 2015-02-09. Retrieved 2015-01-26. https://web.archive.org/web/20150209195111/https://polarssl.org/tech-updates/releases/polarssl-1.3.6-released
"mbed TLS 1.3.10 released". 2015-02-08. Archived from the original on 2015-02-09. Retrieved 2015-02-09. https://web.archive.org/web/20150209180352/https://polarssl.org/tech-updates/releases/mbedtls-1.3.10-released
"mbed TLS 1.3.10 released". 2015-02-08. Archived from the original on 2015-02-09. Retrieved 2015-02-09. https://web.archive.org/web/20150209180352/https://polarssl.org/tech-updates/releases/mbedtls-1.3.10-released
"mbed TLS 1.3.10 released". 2015-02-08. Archived from the original on 2015-02-09. Retrieved 2015-02-09. https://web.archive.org/web/20150209180352/https://polarssl.org/tech-updates/releases/mbedtls-1.3.10-released
"NSS 3.15.5 release notes". Mozilla Developer Network. Mozilla. Archived from the original on January 26, 2015. Retrieved 2015-01-26. https://archive.today/20150126155403/https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.5_release_notes
"Bug 961416 - Support RFC6091 - Using OpenPGP Keys for Transport Layer Security Authentication (TLS1.2)". Mozilla. Retrieved 2014-06-18. https://bugzilla.mozilla.org/show_bug.cgi?id=961416
"Bug 972145 - Implement the encrypt-then-MAC TLS extension". Mozilla. Retrieved 2014-11-06. https://bugzilla.mozilla.org/show_bug.cgi?id=972145
"NSS 3.17.1 release notes". Archived from the original on 2019-04-19. Retrieved 2014-10-17. https://web.archive.org/web/20190419152214/https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.1_release_notes
"NSS 3.21 release notes". Archived from the original on 2021-12-07. Retrieved 2015-11-14. https://web.archive.org/web/20211207025807/https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
"NSS 3.15.5 release notes". Mozilla Developer Network. Mozilla. Archived from the original on January 26, 2015. Retrieved 2015-01-26. https://archive.today/20150126155403/https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.5_release_notes
"Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.2 [22 Jan 2015]". Archived from the original on September 4, 2014. Retrieved 2015-01-22. https://web.archive.org/web/20140904045720/http://www.openssl.org/news/openssl-1.0.2-notes.html
"OpenSSL Security Advisory [15 Oct 2014]". 2014-10-15. https://openssl-library.org/news/secadv/20141015.txt
"OpenSSL 1.1.0 Series Release Notes". www.openssl.org. Archived from the original on 2018-03-17. Retrieved 2016-09-03. https://web.archive.org/web/20180317162208/https://www.openssl.org/news/openssl-1.1.0-notes.html
"Major changes between OpenSSL 1.0.1f and OpenSSL 1.0.1g [7 Apr 2014]". 2014-04-07. Archived from the original on 2015-01-20. Retrieved 2015-02-10. https://web.archive.org/web/20150120120428/https://www.openssl.org/news/openssl-1.0.1-notes.html
"OpenSSL Announces Final Release of OpenSSL 3.2.0". 2023-11-23. Retrieved 2024-10-11. https://openssl-library.org/post/2023-11-06-openssl32/
rustls does not implement earlier versions that would warrant protection against insecure downgrade
"Microsoft Security Bulletin MS15-121". March 2023. Retrieved 2024-04-28. https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-121
"Microsoft Security Bulletin MS15-121". March 2023. Retrieved 2024-04-28. https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-121
"What's New in TLS/SSL (Schannel SSP)". 31 August 2016. Retrieved 2024-04-28. https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831771(v=ws.11)
"Microsoft Security Bulletin MS15-121". March 2023. Retrieved 2024-04-28. https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-121
"What's New in TLS/SSL (Schannel SSP)". 31 August 2016. Retrieved 2024-04-28. https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831771(v=ws.11)
"Microsoft Security Bulletin MS15-121". March 2023. Retrieved 2024-04-28. https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-121
"wolfSSL (Formerly CyaSSL) Release 3.7.0 (10/26/2015)". 2015-10-26. Retrieved 2015-11-19. https://www.wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
"wolfSSL Version 4.2.0 is Now Available!". 22 October 2019. Retrieved 2021-08-13. https://www.wolfssl.com/wolfssl-version-4-2-0-now-available/
"wolfSSL supports Raw Public Keys". August 2023. Retrieved 2024-10-25. https://www.wolfssl.com/wolfssl-supports-raw-public-keys/
"Version 1.11.31, 2015-08-30 — Botan". 2016-08-30. Retrieved 2016-09-08. https://botan.randombit.net/news.html#version-1-11-31-2016-08-30
"Trusted Platform Module (TPM) — Botan". https://botan.randombit.net/handbook/api_ref/tpm.html
Pure Java implementations relies on JVM processor optimization capabilities, such as OpenJDK support for AES-NI[228] /wiki/Java_virtual_machine
BSAFE SSL-J can be configured to run in native mode, using BSAFE Crypto-C Micro Edition to benefit from processor optimization.[229]
"Comparison of BSAFE TLS libraries: Micro Edition Suite vs SSL-J | Dell Malaysia". https://www.dell.com/support/kbdoc/en-my/000204717/comparison-of-bsafe-tls-libraries-micro-edition-suite-vs-ssl-j
Mavrogiannopoulos, Nikos (October 9, 2016). "[gnutls-devel] gnutls 3.5.5". https://lists.gnupg.org/pipermail/gnutls-devel/2016-October/008194.html
"Trusted Platform Module (GnuTLS 3.8.4)". https://www.gnutls.org/manual/html_node/Trusted-Platform-Module.html
"Java SSL provider with AES-NI support". stackoverflow.com. https://stackoverflow.com/questions/14259671/java-ssl-provider-with-aes-ni-support
"PolarSSL 1.3.3 released". 2013-12-31. Archived from the original on 2014-01-07. Retrieved 2014-01-07. We've incorporated support for AES-NI in our AES and GCM modules. https://web.archive.org/web/20140107122023/https://polarssl.org/tech-updates/releases/polarssl-1.3.3-released
"NXP/Plug-and-trust". GitHub. https://github.com/NXP/plug-and-trust/tree/master?tab=readme-ov-file
"ARMmbed/Mbed-os-atecc608a". GitHub. https://github.com/ARMmbed/mbed-os-atecc608a/
Normally NSS's libssl performs all operations via the PKCS#11 interface, either to hardware or software tokens
"Bug 706024 - AES-NI enhancements to NSS on Sandy Bridge systems". Retrieved 2013-09-28. https://bugzilla.mozilla.org/show_bug.cgi?id=706024
"Bug 479744 - RFE : VIA Padlock ACE support (hardware RNG, AES, SHA1 and SHA256)". Retrieved 2014-04-11. https://bugzilla.mozilla.org/show_bug.cgi?id=479744
"Подключаем Рутокен ЭЦП к OpenSSL" (in Russian). 16 December 2011. https://habrahabr.ru/post/134725/
"Поддержка Рутокен ЭЦП в OpenSSL (Страница 1) — Рутокен и Open Source — Форум Рутокен" (in Russian). http://forum.rutoken.ru/topic/1639/
"OpenSSL ГОСТ" (in Russian). Archived from the original on 2018-06-23. https://web.archive.org/web/20180623005200/https://dev.rutoken.ru/pages/viewpage.action?pageId=18055184
"git.openssl.org Git - openssl.git/commitdiff". git.openssl.org. https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddacb8f27ba4c8a8d51c306c150e1a8703b008f2
"Tpm2-software/Tpm2-openssl". GitHub. https://github.com/tpm2-software/tpm2-openssl
"Provider - OpenSSL Documentation". https://docs.openssl.org/3.0/man7/provider/
"NXP/Plug-and-trust". GitHub. https://github.com/NXP/plug-and-trust/tree/master?tab=readme-ov-file
"STSW-STSA110-SSL - STSAFE-A integration within OpenSSL security stack". STMicroelectronics. https://www.st.com/en/embedded-software/stsw-stsa110-ssl.html
SecECKey.c on GitHub https://github.com/apple-oss-distributions/Security/blob/Security-55179.13/sec/Security/SecECKey.c
"Crypto Officer Role Guide for FIPS 140-2 Compliance OS X Mountain Lion v10.8" (PDF). Apple Inc. 2013. http://km.support.apple.com/library/APPLE/APPLECARE_ALLGEOS/HT5396/Crypto_Officer_Role_Guide_for_FIPS_140-2_Compliance_OS_X_Mountain_Lion_v10.8.pdf
"CAAM support in wolfSSL". 10 March 2020. https://community.nxp.com/t5/i-MX-Processors/CAAM-support-in-wolfSSL/m-p/1013736
"wolfTPM Portable TPM 2.0 Library". https://www.wolfssl.com/products/wolftpm/
"Announcing wolfSSL TPM support for the Espressif ESP32". 20 June 2024. https://www.wolfssl.com/announcing-wolfssl-tpm-support-for-the-espressif-esp32/
"WolfSSL SSL/TLS Support for NXP SE050 – wolfSSL". 22 February 2024. https://www.wolfssl.com/wolfssl-ssl-tls-support-for-nxp-se050/
"WolfSSL support for the ATECC608 Crypto Coprocessor – wolfSSL". 13 October 2021. https://www.wolfssl.com/blog-wolfssl-support-atecc608-crypto-coprocessor/
"WolfSSL support for STSAFE-A100 crypto coprocessor – wolfSSL". 20 September 2018. https://www.wolfssl.com/wolfssl-support-stsafe-a100-crypto-coprocessor/
"Support for MAXQ1065 in wolfSSL – wolfSSL". 29 November 2022. https://www.wolfssl.com/support-maxq1065-wolfssl/
"LibreSSL 2.2.1 Released". 2015-07-08. Retrieved 2016-01-30. https://marc.info/?l=openbsd-announce&m=143635991232240
"ktls integration for rustls". GitHub. Retrieved 2024-08-29. https://github.com/rustls/ktls
"wolfProvider". 2021-11-10. Retrieved 2022-01-17. https://www.wolfssl.com/wolfengine-openssl-provider-solution-now-public/
"Version 1.11.26, 2016-01-04 — Botan". 2016-01-04. Retrieved 2016-02-25. http://botan.randombit.net/news.html#version-1-11-26-2016-01-04
The PKCS #11 URI Scheme. doi:10.17487/RFC7512. RFC 7512. https://datatracker.ietf.org/doc/html/rfc7512
"libp11: PKCS#11 wrapper library". 19 January 2018 – via GitHub. https://github.com/OpenSC/libp11
The PKCS #11 URI Scheme. doi:10.17487/RFC7512. RFC 7512. https://datatracker.ietf.org/doc/html/rfc7512
"Windows CNG bridge for rustls". GitHub. Retrieved 2024-08-29. https://github.com/rustls/rustls-cng
On the fly replaceable/augmentable.
"Nss compat ossl - Fedora Project Wiki". fedoraproject.org. https://fedoraproject.org/wiki/Nss_compat_ossl
"rustls-openssl compatibility layer". GitHub. Retrieved 2024-08-29. https://github.com/rustls/rustls-openssl-compat/
"NSPR". Mozilla Developer Network. https://www.mozilla.org/projects/nspr/
"NSPR". Mozilla Developer Network. https://www.mozilla.org/projects/nspr/
For Unix/Linux it uses /dev/urandom if available, for Windows it uses CAPI. For other platforms it gets data from clock, and tries to open system files. NSS has a set of platform dependent functions it uses to determine randomness.