A comprehensive study on security attacks on SSL/TLS Protocol

被引:0
|
作者
Sirohi, Preeti [1 ]
Agarwal, Amit [2 ]
Tyagi, Sapna [1 ]
机构
[1] Inst Mangement studies, Ghaziabad, Uttar Pradesh, India
[2] UPES Dehradun, Dehra Dun, Uttar Pradesh, India
关键词
Security; Attacks; TLS/SSL; Cipher suites;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Secure Socket Layer (SSL) protocol was introduced in 1994 and was later renamed as transport layer security (TLS) protocol for securing transport layer. SSL/TLS protocol is used for securing communication on the network by ensuring data confidentiality, data integrity and authenticity between the communicating party. Authentication of the communicating party and securing transfer of data is done through certificates, key exchange and cipher suites. Security issues were found during evolutionary development of SSL/TLS protocol. The paper gives a detailed chronological order of attacks of past 22 years on SSL/TLS protocol.
引用
收藏
页码:893 / 897
页数:5
相关论文
共 50 条
  • [1] Implementation of a Security Layer for the SSL/TLS Protocol
    Ordean, Mihai
    Giurgiu, Mircea
    [J]. 2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 209 - 212
  • [2] Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment
    Iqbal Luqman Bin Mohd Paris
    Mohamed Hadi Habaebi
    Alhareth Mohammed Zyoud
    [J]. Wireless Personal Communications, 2023, 132 : 163 - 182
  • [3] Planning-based Security Testing of the SSL/TLS Protocol
    Bozic, Josip
    Kleine, Kristoffer
    Simos, Dimitris E.
    Wotawa, Franz
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 347 - 355
  • [4] Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment
    Paris, Iqbal Luqman Bin Mohd
    Habaebi, Mohamed Hadi
    Zyoud, Alhareth Mohammed
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (01) : 163 - 182
  • [5] SSL/TLS Attacks: Analysis and Evaluation
    Eldewahi, Abeer E. W.
    Sharfi, Tasneem M. H.
    Mansor, Abdelhamid A.
    Mohamed, Nashwa A. F.
    Alwahbani, Samah M. H.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING (ICCNEEE), 2015, : 203 - 208
  • [6] Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol
    Zolotukhin, Mikhail
    Hamalainen, Timo
    Kokkonen, Tero
    Niemela, Antti
    Siltanen, Jarmo
    [J]. INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, 2015, 9247 : 274 - 285
  • [7] Research on Security of the Extended SSL/TLS Protocol Based on Trusted Platform Module
    Yu, Yue
    Sun, Hao
    Yu, Fajiang
    Kong, Yanan
    [J]. ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 861 - 866
  • [8] SoK: Lessons Learned from SSL/TLS Attacks
    Meyer, Christopher
    Schwenk, Joerg
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2013, 2014, 8267 : 189 - 209
  • [9] New key management protocol for SSL/TLS
    Hajjeh, I
    Serhrouchni, A
    Tastet, F
    [J]. NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY II, 2003, 133 : 251 - 262
  • [10] Stealing secrets with SSL/TLS and SSH -: Kleptographic attacks
    Golobiewski, Zbigniew
    Kutylowski, Miroslaw
    Zagorski, Filip
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 191 - +