메뉴 건너뛰기




Volumn 2015-October, Issue , 2015, Pages 1185-1196

On the security of TLS 1.3 and QUIC against weaknesses in PKCS#1 v1.5 encryption

Author keywords

Chosen ciphertext attack; Cross protocol attack; TLS

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; NETWORK SECURITY; SEEBECK EFFECT; THALLIUM;

EID: 84954113686     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2810103.2813657     Document Type: Conference Paper
Times cited : (72)

References (36)
  • 4
    • 84865516206 scopus 로고    scopus 로고
    • Efficient padding oracle attacks on cryptographic hardware
    • Reihaneh Safavi-Naini and Ran Canetti, editors volume 7417 of Lecture Notes in Computer Science, Springer, August 2012
    • Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, and Joe-Kai Tsay. Efficient padding oracle attacks on cryptographic hardware. In Reihaneh Safavi-Naini and Ran Canetti, editors, Advances in Cryptology-CRYPTO 2012, volume 7417 of Lecture Notes in Computer Science, pages 608-625. Springer, August 2012.
    • (2012) Advances in Cryptology-CRYPTO , pp. 608-625
    • Bardou, R.1    Focardi, R.2    Kawamoto, Y.3    Simionato, L.4    Steel, G.5    Tsay, J.6
  • 6
    • 44949237454 scopus 로고    scopus 로고
    • Elliptic curve cryptography (ecc) cipher suites for transport layer security (tls)
    • May Updated by RFC 5246
    • S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Moeller. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC 4492 (Informational), May 2006. Updated by RFC 5246.
    • (2006) RFC 4492 (Informational)
    • Blake-Wilson, S.1    Bolyard, N.2    Gupta, V.3    Hawk, C.4    Moeller, B.5
  • 7
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
    • Hugo Krawczyk, editor volume 1462 of Lecture Notes in Computer Science, Springer, August
    • Daniel Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In Hugo Krawczyk, editor, Advances in Cryptology-CRYPTO'98, volume 1462 of Lecture Notes in Computer Science, pages 1-12. Springer, August 1998.
    • (1998) Advances in Cryptology-CRYPTO'98 , pp. 1-12
    • Bleichenbacher, D.1
  • 8
    • 84910612876 scopus 로고    scopus 로고
    • Wan-Teh Chang and Adam Langley. QUIC crypto, 2013. https://docs.google.com/document/d/1g5nIXAIkN-Y-7XJW5K45IblHd-L2f5LTaDUDwvZ5L6g/edit?pli=1.
    • (2013) QUIC Crypto
    • Chang, W.1    Langley, A.2
  • 9
    • 84857775893 scopus 로고    scopus 로고
    • On the joint security of encryption and signature in EMV
    • Orr Dunkelman, editor volume 7178 of Lecture Notes in Computer Science, Springer, February / March 2012
    • Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, and Mario Strefler. On the joint security of encryption and signature in EMV. In Orr Dunkelman, editor, Topics in Cryptology-CT-RSA 2012, volume 7178 of Lecture Notes in Computer Science, pages 116-135. Springer, February / March 2012.
    • Topics in Cryptology-CT-RSA 2012 , pp. 116-135
    • Paul Degabriele, J.1    Lehmann, A.2    Paterson, K.G.3    Smart, N.P.4    Strefler, M.5
  • 14
    • 84910593638 scopus 로고    scopus 로고
    • Multi-stage key exchange and the case of google's QUIC protocol
    • Gail-Joon Ahn, Moti Yung, and Ninghui Li, editors Scottsdale, AZ, USA, November 3-7, 2014, ACM, 2014
    • Marc Fischlin and Felix Günther Multi-stage key exchange and the case of google's QUIC protocol. In Gail-Joon Ahn, Moti Yung, and Ninghui Li, editors, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pages 1193-1204. ACM, 2014.
    • Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security , pp. 1193-1204
    • Fischlin, M.1    Günther, F.2
  • 18
    • 84865589043 scopus 로고    scopus 로고
    • Bleichenbacher's attack strikes again: Breaking PKCS#1 v1.5 in XML encryption
    • Sara Foresti, Moti Yung, and Fabio Martinelli, editors volume 7459 of Lecture Notes in Computer Science, Springer, September 2012
    • Tibor Jager, Sebastian Schinzel, and Juraj Somorovsky. Bleichenbacher's attack strikes again: Breaking PKCS#1 v1.5 in XML encryption. In Sara Foresti, Moti Yung, and Fabio Martinelli, editors, ESORICS 2012: 17th European Symposium on Research in Computer Security, volume 7459 of Lecture Notes in Computer Science, pages 752-769. Springer, September 2012.
    • ESORICS 2012: 17th European Symposium on Research in Computer Security , pp. 752-769
    • Jager, T.1    Schinzel, S.2    Somorovsky, J.3
  • 22
    • 35248848850 scopus 로고    scopus 로고
    • Attacking rsa-based sessions in ssl/tls
    • Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors volume 2779 of Lecture Notes in Computer Science, Springer, September 2003
    • Vlastimil Klí;ma, Ondrej Pokorný;, and Tomá;s Rosa. Attacking RSA-based sessions in SSL/TLS. In Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 426-440. Springer, September 2003.
    • (2003) Cryptographic Hardware and Embedded Systems-CHES , pp. 426-440
    • Klí1    ma, V.2    Pokorný3    , O.4    Rosa, T.5
  • 23
    • 84945194545 scopus 로고    scopus 로고
    • How secure and quick is QUIC? Provable security and performance analyses
    • SP 2015, San Jose, CA, USA, May 17-21, 2015, IEEE Computer Society
    • Robert Lychev, Samuel Jero, Alexandra Boldyreva, and Cristina Nita-Rotaru. How secure and quick is QUIC? Provable security and performance analyses. In 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pages 214-231. IEEE Computer Society, 2015.
    • (2015) 2015 IEEE Symposium on Security and Privacy , pp. 214-231
    • Lychev, R.1    Jero, S.2    Boldyreva, A.3    Nita-Rotaru, C.4
  • 24
    • 84954154587 scopus 로고    scopus 로고
    • ATM signalling support for IP over atm-uni signalling 4.0 update
    • April
    • M. Maher. ATM Signalling Support for IP over ATM-UNI Signalling 4.0 Update. RFC 2331 (Proposed Standard), April 1998.
    • (1998) RFC 2331 (Proposed Standard)
    • Maher, M.1
  • 25
    • 33846862428 scopus 로고    scopus 로고
    • A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0
    • Joe Kilian, editor volume 2139 of Lecture Notes in Computer Science, Springer, August 2001
    • James Manger. A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0. In Joe Kilian, editor, Advances in Cryptology-CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 230-238. Springer, August 2001.
    • (2001) Advances in Cryptology-CRYPTO , pp. 230-238
    • Manger, J.1
  • 28
    • 85061943650 scopus 로고    scopus 로고
    • Revisiting ssl/tls implementations: New bleichenbacher side channels and attacks
    • San Diego, CA, USA, August 20-22, 2014
    • Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jörg Schwenk, Sebastian Schinzel, and Erik Tews. Revisiting SSL/TLS implementations: New bleichenbacher side channels and attacks. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., pages 733-748, 2014.
    • (2014) Proceedings of the 23rd USENIX Security Symposium , pp. 733-748
    • Meyer, C.1    Somorovsky, J.2    Weiss, E.3    Schwenk, J.4    Schinzel, S.5    Tews, E.6
  • 29
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • Ehab Al-Shaer, Somesh Jha, and Angelos D. Keromytis, editors ACM Press, November
    • Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Ehab Al-Shaer, Somesh Jha, and Angelos D. Keromytis, editors, ACM CCS 09: 16th Conference on Computer and Communications Security, pages 199-212. ACM Press, November 2009.
    • (2009) ACM CCS 09: 16th Conference on Computer and Communications Security , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 30
    • 85027004652 scopus 로고    scopus 로고
    • Bulletproof ssl tls understanding and deploying ssl/tls and pki to secure servers and web applications
    • August
    • Ivan Ristić;. Bulletproof SSL and TLS. Understanding and deploying SSL/TLS and PKI to secure servers and web applications. Feisty Duck, August 2014.
    • (2014) Feisty Duck
    • Ristić, I.1
  • 32
    • 84977947706 scopus 로고    scopus 로고
    • Jim Roskind. QUIC design document, 2013. https://docs.google.com/a/chromium.org/document/d/1RNHkx-VvKWyWg6Lr8SZ-saqsQx7rFV-ev2jRFUoVD34.
    • (2013) QUIC Design Document
    • Roskind, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.