Integration of the digital signature in the protocol SSL/TLS

被引:0
|
作者
Serhrouchni, Ahmed [1 ]
Hajjeh, Ibrahim [1 ]
机构
[1] Telecom Paris, LTCI, UMR 5141, CNRS, F-75013 Paris, France
关键词
Internet security; transmission protocol; electronic signature; computing transaction; e-business; client-server architecture; standardization;
D O I
10.1007/BF03219921
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
SSL/TLs is currently the most deployed security protocol on the Internet. SSL/TLS provides end-to-end secure communications between two entities with authentication and data protection. However, what is missing from the protocol is a way to provide the non-repudiation service. In this paper we describe a generic implementation of the non-repudiation service as an optional module in the SSL/TLS protocol. This approach provides both parties with evidence that the transaction has taken place and a clear separation with application design and development. We discuss the motivation for our approach and our proposed architecture.
引用
下载
收藏
页码:522 / 541
页数:20
相关论文
共 50 条
  • [41] RFCcertDT: a testing tool for certificate validation in SSL/TLS
    Chen C.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (03): : 20 - 25
  • [42] DRPSD: An Novel Method of Identifying SSL/TLS Traffic
    Liu, Changxing
    Sun, Guanglu
    Xue, Yibo
    2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [43] Fine-grained Identification for SSL/TLS Packets
    Kong, Lingjing
    Zhou, Ying
    Huang, Guowei
    Wang, Huijing
    International Journal of Network Security, 2020, 22 (06) : 975 - 980
  • [44] Detecting Proper SSL/TLS Implementation with Usage Patterns
    Adeenze-Kangah, Justice
    Chen, Yuting
    2018 INTERNATIONAL SEMINAR ON COMPUTER SCIENCE AND ENGINEERING TECHNOLOGY (SCSET 2018), 2019, 1176
  • [45] SSL/TLS session-aware user authentication
    Oppliger, Rolf
    Hauser, Ralf
    Basin, David
    COMPUTER, 2008, 41 (03) : 59 - +
  • [46] Cryptographic Assessment of SSL/TLS Servers Popular in India
    Jain, Prakhar
    Shukla, K. K.
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 112 - 123
  • [47] Stealing secrets with SSL/TLS and SSH -: Kleptographic attacks
    Golobiewski, Zbigniew
    Kutylowski, Miroslaw
    Zagorski, Filip
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 191 - +
  • [48] A technique to circumvent SSL/TLS validations on iOS devices
    D'Orazio, Christian J.
    Choo, Kim-Kwang Raymond
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 74 : 366 - 374
  • [49] On the robustness of applications based on the SSL and TLS security Protocols
    Berbecaru, Diana
    Lioy, Antonio
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 248 - +
  • [50] Positioning-Protocol-Based Digital Signature
    Xue, Qingshui
    Li, Fengying
    Cao, Zhenfu
    WIRELESS INTERNET (WICON 2014), 2015, 146 : 167 - 172