메뉴 건너뛰기




Volumn 29, Issue 12, 2006, Pages 2238-2246

SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle

Author keywords

Electronic commerce; Man in the middle attack; Security; SSL TLS protocol; User authentication

Indexed keywords

COMPUTER CRIME; COMPUTER SOFTWARE; ELECTRONIC COMMERCE; INTERNET; NETWORK PROTOCOLS; SECURITY SYSTEMS;

EID: 33745913964     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2006.03.004     Document Type: Article
Times cited : (53)

References (31)
  • 1
    • 33745912130 scopus 로고    scopus 로고
    • N. Asokan, V. Niemi, K. Nyberg, Man-in-the-middle in tunneled authentication protocols, in: Proceedings of the International Workshop on Security Protocols, 2003, pp. 15-24 (also available as IACR ePrint 2002/163).
  • 4
    • 0031351741 scopus 로고    scopus 로고
    • M. Bellare, et al., A concrete security treatment of symmetric encryption: analysis of the DES modes of operation, in: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS '97), 1997, pp. 394-403.
  • 5
    • 84957693225 scopus 로고    scopus 로고
    • Chosen Ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
    • Kadrwer S. (Ed), Springer, Berlin
    • Bleichenbacher D. Chosen Ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Kadrwer S. (Ed). Proceedings of CRYPTO '98 (1998), Springer, Berlin 1-12
    • (1998) Proceedings of CRYPTO '98 , pp. 1-12
    • Bleichenbacher, D.1
  • 7
    • 33746075784 scopus 로고    scopus 로고
    • Fast and secure immunization against adaptive man-in-the-middle impersonation
    • Proceedings of EUROCRYPT '97, Springer, Berlin
    • Cramer R., and Damgård I. Fast and secure immunization against adaptive man-in-the-middle impersonation. Proceedings of EUROCRYPT '97. Lecture Notes in Computer Science vol. 1233 (1997), Springer, Berlin 75-87
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 75-87
    • Cramer, R.1    Damgård, I.2
  • 8
    • 33745880269 scopus 로고    scopus 로고
    • T. Dierks, C. Allen, The TLS Protocol Version 1.0, Request for Comments 2246, January 1999.
  • 10
    • 84990731886 scopus 로고
    • How to prove yourself: practical solutions to identification and signature problems
    • Proceedings of CRYPTO '86, Springer, Berlin
    • Fiat A., and Shamir A. How to prove yourself: practical solutions to identification and signature problems. Proceedings of CRYPTO '86. Lecture Notes in Computer Science vol. 263 (1987), Springer, Berlin 186-194
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 11
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • Proceedings of EUROCRYPT '88, Springer, Berlin
    • Guillou L.C., and Quisquater J. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. Proceedings of EUROCRYPT '88. Lecture Notes in Computer Science vol. 330 (1988), Springer, Berlin 112-123
    • (1988) Lecture Notes in Computer Science , vol.330 , pp. 112-123
    • Guillou, L.C.1    Quisquater, J.2
  • 12
    • 33745916320 scopus 로고    scopus 로고
    • M. Jakobsson, S. Myers, Stealth attacks and delayed password disclosure, 2005, .
  • 13
    • 33745913507 scopus 로고    scopus 로고
    • B. Kaliski, M. Nyström, Authentication: risk vs. readiness, challenges and solutions, in: Presentation held at the BITS Protecting the Core Forum, October 6, 2004, .
  • 14
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Communications of the ACM 24 (1981) 770-772
    • (1981) Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 15
    • 27844462024 scopus 로고    scopus 로고
    • Why have public key infrastructures failed so far?
    • Javier L., Oppliger R., and Pernul G. Why have public key infrastructures failed so far?. Internet Research 15 5 (2005) 544-556
    • (2005) Internet Research , vol.15 , Issue.5 , pp. 544-556
    • Javier, L.1    Oppliger, R.2    Pernul, G.3
  • 16
    • 33846862428 scopus 로고    scopus 로고
    • A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS#1 v2.0
    • Springer, Berlin
    • Manger J. A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS#1 v2.0. Proceedings of CRYPTO '01 (2001), Springer, Berlin 230-238
    • (2001) Proceedings of CRYPTO '01 , pp. 230-238
    • Manger, J.1
  • 17
    • 85084160482 scopus 로고    scopus 로고
    • J. Mitchell, V. Shmatikov, U. Stern, Finite-state analysis of SSL 3.0, in: Proceedings of the Seventh USENIX Security Symposium, USENIX, 1998, pp. 201-216.
  • 19
    • 33646143327 scopus 로고    scopus 로고
    • Effective protection against phishing and web spoofing
    • Proceedings of the 9th IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2005), Springer, Berlin
    • Oppliger R., and Gajek S. Effective protection against phishing and web spoofing. Proceedings of the 9th IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2005). Lecture Notes in Computer Science vol. 3677 (2005), Springer, Berlin 32-41
    • (2005) Lecture Notes in Computer Science , vol.3677 , pp. 32-41
    • Oppliger, R.1    Gajek, S.2
  • 20
    • 33745885542 scopus 로고    scopus 로고
    • R. Oppliger, R. Hauser, D. Basin, SSL/TLS Session-Aware User Authentication Revisited, Computer Communications, in preparation.
  • 23
    • 17444421583 scopus 로고    scopus 로고
    • Does trusted computing remedy computer security problems?
    • Oppliger R., and Rytz R. Does trusted computing remedy computer security problems?. IEEE Security and Privacy 3 2 (2005) 16-19
    • (2005) IEEE Security and Privacy , vol.3 , Issue.2 , pp. 16-19
    • Oppliger, R.1    Rytz, R.2
  • 26
    • 33745918212 scopus 로고    scopus 로고
    • RSA Laboratories, PKCS #11 v2.20: Cryptographic Token Interface Standard, June 28, 2004.
  • 28
    • 33745886115 scopus 로고    scopus 로고
    • R. Shirey, Internet Security Glossary, Request for Comments 2828, May 2000.
  • 29
    • 84947212539 scopus 로고    scopus 로고
    • Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS ...
    • Proceedings of EUROCRYPT '02, Springer, Amsterdam, Netherland
    • Vaudenay S. Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS .... Proceedings of EUROCRYPT '02. Lecture Notes in Computer Science vol. 2332 (2002), Springer, Amsterdam, Netherland 534-545
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 534-545
    • Vaudenay, S.1
  • 30
    • 85084161317 scopus 로고    scopus 로고
    • Z.E. Ye, S. Smith, Trusted paths for browsers, in: Proceedings of the USENIX Security Symposium, 2002, pp. 263-279.
  • 31
    • 84946432389 scopus 로고    scopus 로고
    • D. Wagner, B. Schneier, Analysis of the SSL 3.0 Protocol. USENIX Security Symposium, 1996, pp. 29-40.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.