Key Vulnerabilities in SSL & TLS That Needs To Be Mitigated

被引:0
|
作者
Alhazmi, Shatha Abdulah E. [1 ]
Elleithy, Khaled [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
关键词
SSL; TLS; RC4; cryptographic; Security Protocol;
D O I
10.1109/LISAT58403.2023.10179546
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The cryptographic security protocols are designed to ensure that the information transmission that is taking place between two entities is secured and is not impacted while interaction occurs among them. Security protocols are a set of rules that are formulated to ensure that the intruder or third party is not able to access the information that is transmitted. In this context, one of the algorithms that could be used is the RC4 algorithm. There are many discussions about the RC4 algorithm, but as of now is only theoretically dominant. It is a fact that the theory alone cannot complete the RCA algorithm process in a detailed manner. The applications reveal the input and do not produce any output of the processes involved. This research paper will illustrate the vulnerability and possible solutions to avoid the RC4 Algorithm attack.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] New key management protocol for SSL/TLS
    Hajjeh, I
    Serhrouchni, A
    Tastet, F
    [J]. NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY II, 2003, 133 : 251 - 262
  • [2] SSL/TLS protocol enablement for key recovery
    Shoriak, TG
    [J]. COMPUTERS & SECURITY, 2000, 19 (01) : 100 - 104
  • [3] A novel extension of SSL/TLS based on quantum key distribution
    Faraj, Sufyan T.
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3, 2008, : 919 - 922
  • [4] Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis
    Wang, Yingjie
    Xu, Guangquan
    Liu, Xing
    Mao, Weixuan
    Si, Chengxiang
    Pedrycz, Witold
    Wang, Wei
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 167
  • [5] Navigating Through SSL/TLS Implementation Vulnerabilities in Vehicle-related iOS Apps
    Auerbach, Jacob M.
    Zhang, Linxi
    [J]. 2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [6] CUDA-SSL: SSL/TLS Accelerated by GPU
    Lee, Wai-Kong
    Wong, Xian-Fu
    Goi, Bok-Min
    Phan, Raphael C. -W.
    [J]. 2017 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2017,
  • [7] Using SSL/TLS in authentication and key agreement procedures of future mobile networks
    Kambourakis, G
    Rouskas, A
    Gritzalis, S
    [J]. 2002 4TH INTERNATIONAL WORKSHOP ON MOBILE AND WIRELESS COMMUNICATION NETWORK, 2002, : 152 - 156
  • [8] Lesson 173: SSL and TLS
    Greenfield, David
    [J]. Network Magazine, 2002, 17 (12):
  • [9] ISAKMP handshake for SSL/TLS
    Hajjeh, I
    Serhrouchni, A
    Tastet, F
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1481 - 1485
  • [10] SSL/TLS with Quantum Cryptography
    Pivk, Mario
    Kollmitzer, Christian
    Rass, Stefan
    [J]. ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 96 - +