Java Backend Technology
Java Backend Technology
Jan 25, 2022 · Information Security

Can HTTPS Stop Replay Attacks? Deep Dive into TLS Handshake and MAC

This article walks through the TLS handshake, explains how client and server derive symmetric keys and MAC secrets, illustrates the encryption process, and shows why the sequence number in TLS MAC calculations prevents replay attacks, answering whether HTTPS can block such attacks.

HTTPSKey derivationMac
0 likes · 9 min read
Can HTTPS Stop Replay Attacks? Deep Dive into TLS Handshake and MAC
OPPO Amber Lab
OPPO Amber Lab
Feb 19, 2021 · Information Security

How DICE Secures IoT Devices: From Unique IDs to Fast Boot

The article explains the DICE (Device Identity Composition Engine) standard introduced by the Trusted Computing Group, detailing its terminology, chain‑derived CDI mechanism, key generation, certificate issuance, and how it enables device identification, secure boot, rapid startup, data protection, and OTA firmware updates for IoT and mobile devices.

DICEDevice identityIoT security
0 likes · 11 min read
How DICE Secures IoT Devices: From Unique IDs to Fast Boot