메뉴 건너뛰기




Volumn , Issue , 2011, Pages 481-489

Cryptography in the web: The case of cryptographic design flaws in ASP.NET

Author keywords

Application security; Cryptography; Decryption oracle attack; Unauthenticated encryption; Web security

Indexed keywords

ACCESS CONTROL;

EID: 80051989642     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.42     Document Type: Conference Paper
Times cited : (32)

References (31)
  • 1
    • 35048881103 scopus 로고    scopus 로고
    • Can we trust cryptographic software? Cryptographic flaws in GNU privacy guard v1. 2.3
    • Springer
    • P. Nguyen, "Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1. 2.3," in Advances in Cryptology-EUROCRYPT 2004. Springer, 2004, pp. 555-570.
    • (2004) Advances in Cryptology-EUROCRYPT 2004 , pp. 555-570
    • Nguyen, P.1
  • 3
    • 85084163781 scopus 로고    scopus 로고
    • Lessons learned in implementing and deploying crypto software
    • P. Gutmann, "Lessons Learned in Implementing and Deploying Crypto Software," in Proc. USENIX Security Symp, 2002, pp. 315-325.
    • (2002) Proc. USENIX Security Symp , pp. 315-325
    • Gutmann, P.1
  • 4
    • 84893988353 scopus 로고    scopus 로고
    • Implementation of chosen-ciphertext attacks against PGP and GnuPG
    • K. Jallad, J. Katz, and B. Schneier, "Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG," Information Security, pp. 90-101, 2002.
    • (2002) Information Security , pp. 90-101
    • Jallad, K.1    Katz, J.2    Schneier, B.3
  • 5
    • 85084164298 scopus 로고    scopus 로고
    • A chosen-ciphertext attack against several E-mail encryption protocols
    • USENIX Association
    • J. Katz and B. Schneier, "A Chosen-Ciphertext Attack against Several E-mail Encryption Protocols," in Proceedings of the 9th conference on USENIX Security Symposium-Volume 9. USENIX Association, 2000, p. 18.
    • (2000) Proceedings of the 9th Conference on USENIX Security Symposium , vol.9 , pp. 18
    • Katz, J.1    Schneier, B.2
  • 6
    • 0033312792 scopus 로고    scopus 로고
    • Security in the real world: How to evaluate security technology
    • B. Schneier, "Security in the Real World: How To Evaluate Security Technology," Computer Security Journal, vol. 15, no. 4, p. 1, 1999.
    • (1999) Computer Security Journal , vol.15 , Issue.4 , pp. 1
    • Schneier, B.1
  • 7
    • 85073480054 scopus 로고    scopus 로고
    • The perils of unauthenticated encryption: Kerberos version 4
    • Citeseer
    • T. Yu, S. Hartman, and K. Raeburn, "The Perils of Unauthenticated Encryption: Kerberos Version 4," in Proc. NDSS, vol. 4. Citeseer, 2004.
    • (2004) Proc. NDSS , vol.4
    • Yu, T.1    Hartman, S.2    Raeburn, K.3
  • 8
    • 3142623034 scopus 로고    scopus 로고
    • Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm
    • M. Bellare, T. Kohno, and C. Namprempre, "Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm," ACM Transactions on Information and System Security (TISSEC), vol. 7, no. 2, p. 241, 2004.
    • (2004) ACM Transactions on Information and System Security (TISSEC) , vol.7 , Issue.2 , pp. 241
    • Bellare, M.1    Kohno, T.2    Namprempre, C.3
  • 9
    • 51249085821 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • M. Bellare and C. Namprempre, "Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm," Journal of Cryptology, vol. 21, no. 4, pp. 469-491, 2008.
    • (2008) Journal of Cryptology , vol.21 , Issue.4 , pp. 469-491
    • Bellare, M.1    Namprempre, C.2
  • 13
    • 84947212539 scopus 로고    scopus 로고
    • Security flaws induced by CBC padding-applications to SSL
    • Springer
    • S. Vaudenay, "Security Flaws Induced by CBC Padding-Applications to SSL," in Advances in Cryptology-EUROCRYPT 2002. Springer, 2002, pp. 534-545.
    • (2002) Advances in Cryptology-EUROCRYPT 2002 , pp. 534-545
    • Vaudenay, S.1
  • 14
    • 85095110742 scopus 로고    scopus 로고
    • Practical padding oracle attacks
    • J. Rizzo and T. Duong, "Practical Padding Oracle Attacks," USENIX WOOT, 2010.
    • (2010) USENIX WOOT
    • Rizzo, J.1    Duong, T.2
  • 15
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • Springer
    • J. An, Y. Dodis, and T. Rabin, "On the Security of Joint Signature and Encryption," in Advances in Cryptology-EUROCRYPT 2002. Springer, 2002, pp. 83-107.
    • (2002) Advances in Cryptology-EUROCRYPT 2002 , pp. 83-107
    • An, J.1    Dodis, Y.2    Rabin, T.3
  • 16
    • 84880901653 scopus 로고    scopus 로고
    • The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
    • Advances in Cryptology - CRYPTO 2001
    • H. Krawczyk, "The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)," in Advances in Cryptology - CRYPTO 2001. Springer, 2001, pp. 310-331. (Pubitemid 33317923)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 310-331
    • Krawczyk, H.1
  • 17
    • 37349004156 scopus 로고    scopus 로고
    • NIST recommendation for block cipher modes of operation, methods and techniques
    • M. Dworkin, "NIST Recommendation for Block Cipher Modes of Operation, Methods and Techniques," NIST Special Publication.
    • NIST Special Publication
    • Dworkin, M.1
  • 18
    • 80052015333 scopus 로고    scopus 로고
    • Padding oracle attacks on the ISO CBC mode encryption standard
    • K. Paterson and A. Yau, "Padding Oracle Attacks On the ISO CBC Mode Encryption Standard," Topics in Cryptology-CT-RSA 2004, pp. 1995-1995, 2004.
    • (2004) Topics in Cryptology-CT-RSA 2004 , pp. 1995-1995
    • Paterson, K.1    Yau, A.2
  • 20
    • 85177685989 scopus 로고    scopus 로고
    • Padding oracles everywhere
    • T. Duong and J. Rizzo, "Padding Oracles Everywhere," EKOPARTY, 2010.
    • (2010) EKOPARTY
    • Duong, T.1    Rizzo, J.2
  • 23
    • 33745738582 scopus 로고    scopus 로고
    • Side channel attacks on CBC encrypted messages in the PKCS# 7 format
    • V. Klima and T. Rosa, "Side Channel Attacks On CBC Encrypted Messages in the PKCS# 7 Format," IACR ePrint Archive, vol. 98, p. 2003, 2003.
    • (2003) IACR EPrint Archive , vol.98 , pp. 2003
    • Klima, V.1    Rosa, T.2
  • 24
    • 85177642464 scopus 로고    scopus 로고
    • OpenSSL: The open source toolkit for SSL/TLS
    • Last visited
    • E. Young, T. Hudson, and R. Engelschall, "OpenSSL: The Open Source Toolkit for SSL/TLS," World Wide Web, http://www.openssl.org/, Last visited, vol. 9, 2011.
    • (2011) World Wide Web , vol.9
    • Young, E.1    Hudson, T.2    Engelschall, R.3
  • 28
    • 26444609149 scopus 로고    scopus 로고
    • Padding oracle attacks on CBC-mode encryption with secret and random IVs
    • Fast Software Encryption: 12th International Workshop, FSE 2005. Revised Selected Papers
    • A. Yau, K. Paterson, and C. Mitchell, "Padding Oracle Attacks on CBC-mode Encryption with Secret and Random IVs," in Fast Software Encryption. Springer, 2005, pp. 299-319. (Pubitemid 41425171)
    • (2005) Lecture Notes in Computer Science , vol.3557 , pp. 299-319
    • Yau, A.K.L.1    Paterson, K.G.2    Mitchell, C.J.3
  • 29
    • 0026851843 scopus 로고    scopus 로고
    • On message integrity in cryptographic protocols
    • Proceedings., 1992 IEEE Computer Society Symposium on. IEEE
    • S. Stubblebine and V. Gligor, "On Message Integrity in Cryptographic Protocols," in Research in Security and Privacy, 1992. Proceedings., 1992 IEEE Computer Society Symposium on. IEEE, 2002, pp. 85-104.
    • (2002) Research in Security and Privacy, 1992 , pp. 85-104
    • Stubblebine, S.1    Gligor, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.