메뉴 건너뛰기




Volumn , Issue , 2012, Pages 62-72

A cross-protocol attack on the TLS protocol

Author keywords

Cross protocol attack; Man in the middle; Server impersonation attack; SSL; TLS

Indexed keywords

CROSS-PROTOCOL ATTACK; IMPERSONATION ATTACK; MAN IN THE MIDDLES (MITM); SSL; TLS;

EID: 84869409533     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382206     Document Type: Conference Paper
Times cited : (59)

References (27)
  • 1
    • 84957714601 scopus 로고
    • Robustness principles for public key protocols
    • volume 963 of Lecture Notes in Computer Science, Springer
    • R. J. Anderson and R. M. Needham. Robustness principles for public key protocols. In CRYPTO 1995, volume 963 of Lecture Notes in Computer Science, pages 236-247. Springer, 1995.
    • (1995) CRYPTO 1995 , pp. 236-247
    • Anderson, R.J.1    Needham, R.M.2
  • 2
    • 77954095439 scopus 로고    scopus 로고
    • A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL
    • INSTICC Press
    • G. V. Bard. A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL. In SECRYPT 2006, pages 99-109. INSTICC Press, 2006.
    • (2006) SECRYPT 2006 , pp. 99-109
    • Bard, G.V.1
  • 4
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
    • volume 1462 of Lecture Notes in Computer Science, Springer
    • D. Bleichenbacher. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. In CRYPTO 1998, volume 1462 of Lecture Notes in Computer Science, pages 1-12. Springer, 1998.
    • (1998) CRYPTO 1998 , pp. 1-12
    • Bleichenbacher, D.1
  • 7
    • 33750936222 scopus 로고    scopus 로고
    • Feasibility of multi-protocol attacks
    • IEEE Computer Society
    • C. J. F. Cremers. Feasibility of multi-protocol attacks. In ARES 2006, pages 287-294. IEEE Computer Society, 2006.
    • (2006) ARES 2006 , pp. 287-294
    • Cremers, C.J.F.1
  • 8
    • 0002100612 scopus 로고
    • On the frequency of numbers containing prime factors of a certain relative magnitude
    • K. Dickman. On the frequency of numbers containing prime factors of a certain relative magnitude. Arkiv för Matematik, Astronomi och Fysik, 22:1-14, 1930.
    • (1930) Arkiv för Matematik Astronomi Och Fysik , vol.22 , pp. 1-14
    • Dickman, K.1
  • 13
    • 36348983733 scopus 로고    scopus 로고
    • Pre-shared key ciphersuites for transport layer security (TLS)
    • P. Eronen and H. Tschofenig. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). RFC 4279 (Proposed Standard), 2005.
    • (2005) RFC 4279 (Proposed Standard)
    • Eronen, P.1    Tschofenig, H.2
  • 15
    • 84869447607 scopus 로고    scopus 로고
    • Discrete logarithms in GF(p) - 160 digits
    • 5 Feb
    • T. Kleinjung. Discrete logarithms in GF(p) - 160 digits. Email on NMBRTHRY-list. 5 Feb 2007.
    • (2007) Email on NMBRTHRY-list
    • Kleinjung, T.1
  • 16
    • 35248848850 scopus 로고    scopus 로고
    • Attacking RSA-based sessions in SSL/TLS
    • volume 2779 of Lecture Notes in Computer Science, Springer
    • V. Klíma, O. Pokorný, and T. Rosa. Attacking RSA-Based Sessions in SSL/TLS. In CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 426-440. Springer, 2003.
    • (2003) CHES 2003 , pp. 426-440
    • Klíma, V.1    Pokorný, O.2    Rosa, T.3
  • 20
    • 0001258323 scopus 로고
    • Factoring integers with elliptic curves
    • H. W. Lenstra, Jr. Factoring integers with elliptic curves. Annals of Mathematics (2), 126(3):649-673, 1987.
    • (1987) Annals of Mathematics (2) , vol.126 , Issue.3 , pp. 649-673
    • Lenstra Jr., H.W.1
  • 21
    • 84863304598 scopus 로고    scopus 로고
    • R Development Core Team, R Foundation for Statistical Computing, Vienna, Austria. ISBN 3-900051-07-0
    • R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2012. ISBN 3-900051-07-0.
    • (2012) R: A Language and Environment for Statistical Computing
  • 26
    • 84947212539 scopus 로고    scopus 로고
    • Security flaws induced by CBC padding- applications to SSL, IPSEC, WTLS
    • volume 2332 of Lecture Notes in Computer Science, Springer
    • S. Vaudenay. Security Flaws Induced by CBC Padding- Applications to SSL, IPSEC, WTLS ... In EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 534-546. Springer, 2002.
    • (2002) EUROCRYPT 2002 , pp. 534-546
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.