Running-mode analysis of the SSL protocol

被引:0
|
作者
Zhang, YQ [1 ]
Liu, XY [1 ]
Yang, B [1 ]
机构
[1] Chinese Acad Sci, Grad Sch, Beijing, Peoples R China
关键词
Internet security; SSL protocol; running-mode analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Secure Socket Layer (SSL) protocol is analyzed using a formal analysis method called the approach of the running-mode analysis. This analysis uncovers successfully some anomalies in the basic SSL handshake protocol. And we give some attacks on these anomalies.
引用
下载
收藏
页码:308 / 311
页数:4
相关论文
共 50 条
  • [1] Running-mode analysis of the Lu-Smolka-SET protocol
    Zhang, YQ
    Wang, ZL
    Wu, JY
    Dong, QK
    EEE '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, E-GOVERNMENT, AND OUTSOURCING, 2005, : 151 - 157
  • [2] The running-mode analysis of two-party optimistic fair exchange protocols
    Zhang, YQ
    Wang, ZL
    Yang, B
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 137 - 142
  • [3] Analysis of the SSL 3.0 protocol
    Wagner, D
    Schneier, B
    PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, 1996, : 29 - 40
  • [4] Security Analysis and Configuration of SSL Protocol
    Liu Niansheng
    Yang Guohao
    Wang Yu
    Guo Donghui
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 216 - +
  • [5] SSL Protocol Analysis Based on Freshness Identifiers
    Liu, Li
    Kang, Yanmei
    Li, Wenyong
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, 2016, 43 : 26 - 31
  • [6] Analysis and Comparison of Several algorithms in SSL/TLS Handshake Protocol
    Luo Qing
    Lin Yaping
    ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 613 - +
  • [7] Performance Analysis of the Novel SSL Based UMTS Authentication Protocol
    Al-Amir, Omar
    Yousef, Sufian
    Zoubaidi, Abdel-Rahman
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1660 - +
  • [8] Applying RBF algorithm in SSL protocol
    Yang, YJ
    Huang, D
    PROCEEDINGS OF THE 4TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-4, 2002, : 2021 - 2029
  • [9] Wearables for running gait analysis: A study protocol
    Mason, Rachel
    Godfrey, Alan
    Barry, Gillian
    Stuart, Samuel
    PLOS ONE, 2023, 18 (09):
  • [10] Design of embedded SSL protocol stack
    School of Computer Sci. and Eng., Univ. of Electronic Sci. and Tech. of China, Chengdu 610054, China
    不详
    Jisuanji Gongcheng, 2006, 16 (283-284):