26 November 2025
Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Ivan Ristić.
Free CT and certificate expiry monitoring from Red Sift. Avoid downtime and security risks with monitoring provided by Red Sift Certificates Lite. Monitors Certificate Transparency as well as your installed certificates. Track up to 250 certificates for free. Recommended by Let’s Encrypt.
Working on the short news for this month’s newsletter, I came across Cypherpunks Hall of Fame, which has a long list of people who have contributed to encryption, privacy, and similar causes. Looking at the list, I couldn’t help but feel that it’s missing one very important person that made a significant contribution.
In late 1994, Netscape Navigator was taking off and growing fast. It had the momentum, but there was something holding it back: Because these were the very early days of the web, there was no way to protect its communication from eavesdropping. HTTP was just plaintext, without encryption. The world was ready to move commerce online, but not before it was deemed safe—or at least relatively safe, judging from today’s perspective.
It fell to Kipp Hickman to make it work. According to Ben Horowitz, Kipp—who had a reputation as a fixer—took the job. By the time he came back, three months later, he had designed and implemented the very first version of the SSL protocol (v2). It wasn’t perfect, but it worked. It was good enough to support Netscape as it was making its first steps into the encrypted web, starting with the Navigator 1.1 release in March 1995—and the rest is history. Fixes to the SSL v2 protocol followed in SSL v3. The next small revision protocol (essentially SSL v3.1) was later adopted by IETF and renamed TLS 1.0. Further improvements followed with TLS 1.1 and 1.2, and then a full rewrite in TLS 1.3.
I had questions I wanted to ask, like: What was the brief and intention? What design constraints were assumed? And how did he arrive at the trust model? Kipp had not been active on the internet for quite a while, and I didn’t even know how to start looking for him. But it turns out that Moxie Marlinspike had the same questions back in 2010, and he managed to find Kipp and speak with him. This is what Kipp had to say:
“Oh, that whole authenticity thing… We just threw that in at the end. We were designing SSL to prevent passive attacks for the most part, you know. We heard about this thing—the man-in-the-middle attack—and so we just threw that in at the end.”
Doing further research, I went through some mailing lists from that time to better understand Kipp’s mindset. It turns out he was very pragmatic and understood that he had one shot and limited resources; rather than shoot for the moon (others were advocating for end-to-end encryption, for example—a problem we still haven’t fully solved), he undertook a smaller project that he could succeed with. And he solved it well. Three months is a very, very, good time for protocol design and implementation, especially back in the day when the world didn’t have a lot of experience with cryptography.
Kipp is the engineer who could. He deserves a place in every Cypherpunks Hall of Fame.
This subscription is just for the newsletter; we won't send you anything else.
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.