Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates
- Authors: Busygin A.G.1, Konoplev A.S.1, Kalinin M.O.1
-
Affiliations:
- Peter the Great St. Petersburg Polytechnic University
- Issue: Vol 50, No 8 (2016)
- Pages: 743-748
- Section: Article
- URL: https://journals.rcsi.science/0146-4116/article/view/174710
- DOI: https://doi.org/10.3103/S0146411616080290
- ID: 174710
Cite item
Abstract
This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.
About the authors
A. G. Busygin
Peter the Great St. Petersburg Polytechnic University
Author for correspondence.
Email: busygin_ag@hotmail.com
Russian Federation, St. Petersburg, 195251
A. S. Konoplev
Peter the Great St. Petersburg Polytechnic University
Email: busygin_ag@hotmail.com
Russian Federation, St. Petersburg, 195251
M. O. Kalinin
Peter the Great St. Petersburg Polytechnic University
Email: busygin_ag@hotmail.com
Russian Federation, St. Petersburg, 195251