Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates


Citar

Texto integral

Acesso aberto Acesso aberto
Acesso é fechado Acesso está concedido
Acesso é fechado Somente assinantes

Resumo

This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.

Sobre autores

A. Busygin

Peter the Great St. Petersburg Polytechnic University

Autor responsável pela correspondência
Email: busygin_ag@hotmail.com
Rússia, St. Petersburg, 195251

A. Konoplev

Peter the Great St. Petersburg Polytechnic University

Email: busygin_ag@hotmail.com
Rússia, St. Petersburg, 195251

M. Kalinin

Peter the Great St. Petersburg Polytechnic University

Email: busygin_ag@hotmail.com
Rússia, St. Petersburg, 195251

Arquivos suplementares

Arquivos suplementares
Ação
1. JATS XML

Declaração de direitos autorais © Allerton Press, Inc., 2016