Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.

About the authors

A. G. Busygin

Peter the Great St. Petersburg Polytechnic University

Author for correspondence.
Email: busygin_ag@hotmail.com
Russian Federation, St. Petersburg, 195251

A. S. Konoplev

Peter the Great St. Petersburg Polytechnic University

Email: busygin_ag@hotmail.com
Russian Federation, St. Petersburg, 195251

M. O. Kalinin

Peter the Great St. Petersburg Polytechnic University

Email: busygin_ag@hotmail.com
Russian Federation, St. Petersburg, 195251


Copyright (c) 2016 Allerton Press, Inc.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies