If you are interested in details of the TLS protocol, check out these two books:
- Implementing SSL / TLS Using Cryptography and PKI [1]
- Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications [2]
In the first one the author implements the protocol (RSA/DH) from scratch (without even using any crypto library). The second one is a classic and contains a lot of interesting scripts (the chapter on using OpenSSL and creating your own PKI is available for free: https://www.feistyduck.com/books/openssl-cookbook/).
I spent some time studying TLS and wrote two blog posts [3][4], in which I decrypt the network traces of the TLS sessions. Maybe someone will find them interesting too.
- Implementing SSL / TLS Using Cryptography and PKI [1]
- Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications [2]
In the first one the author implements the protocol (RSA/DH) from scratch (without even using any crypto library). The second one is a classic and contains a lot of interesting scripts (the chapter on using OpenSSL and creating your own PKI is available for free: https://www.feistyduck.com/books/openssl-cookbook/).
I spent some time studying TLS and wrote two blog posts [3][4], in which I decrypt the network traces of the TLS sessions. Maybe someone will find them interesting too.
[1] https://www.amazon.com/Implementing-SSL-TLS-Using-Cryptograp...
[2] https://www.amazon.com/gp/product/1907117040
[3] https://lowleveldesign.org/2016/03/09/manually-decrypting-ht...
[4] https://lowleveldesign.org/2016/05/10/tls-1-2-aes-gcm-and-ne...