Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates
- Авторлар: Busygin A.G.1, Konoplev A.S.1, Kalinin M.O.1
-
Мекемелер:
- Peter the Great St. Petersburg Polytechnic University
- Шығарылым: Том 50, № 8 (2016)
- Беттер: 743-748
- Бөлім: Article
- URL: https://journals.rcsi.science/0146-4116/article/view/174710
- DOI: https://doi.org/10.3103/S0146411616080290
- ID: 174710
Дәйексөз келтіру
Аннотация
This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.
Авторлар туралы
A. Busygin
Peter the Great St. Petersburg Polytechnic University
Хат алмасуға жауапты Автор.
Email: busygin_ag@hotmail.com
Ресей, St. Petersburg, 195251
A. Konoplev
Peter the Great St. Petersburg Polytechnic University
Email: busygin_ag@hotmail.com
Ресей, St. Petersburg, 195251
M. Kalinin
Peter the Great St. Petersburg Polytechnic University
Email: busygin_ag@hotmail.com
Ресей, St. Petersburg, 195251
Қосымша файлдар
