Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates
- 作者: Busygin A.G.1, Konoplev A.S.1, Kalinin M.O.1
-
隶属关系:
- Peter the Great St. Petersburg Polytechnic University
- 期: 卷 50, 编号 8 (2016)
- 页面: 743-748
- 栏目: Article
- URL: https://journals.rcsi.science/0146-4116/article/view/174710
- DOI: https://doi.org/10.3103/S0146411616080290
- ID: 174710
如何引用文章
详细
This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.
作者简介
A. Busygin
Peter the Great St. Petersburg Polytechnic University
编辑信件的主要联系方式.
Email: busygin_ag@hotmail.com
俄罗斯联邦, St. Petersburg, 195251
A. Konoplev
Peter the Great St. Petersburg Polytechnic University
Email: busygin_ag@hotmail.com
俄罗斯联邦, St. Petersburg, 195251
M. Kalinin
Peter the Great St. Petersburg Polytechnic University
Email: busygin_ag@hotmail.com
俄罗斯联邦, St. Petersburg, 195251
补充文件
