Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates
- Авторы: Busygin A.G.1, Konoplev A.S.1, Kalinin M.O.1
-
Учреждения:
- Peter the Great St. Petersburg Polytechnic University
- Выпуск: Том 50, № 8 (2016)
- Страницы: 743-748
- Раздел: Article
- URL: https://journals.rcsi.science/0146-4116/article/view/174710
- DOI: https://doi.org/10.3103/S0146411616080290
- ID: 174710
Цитировать
Аннотация
This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.
Об авторах
A. Busygin
Peter the Great St. Petersburg Polytechnic University
Автор, ответственный за переписку.
Email: busygin_ag@hotmail.com
Россия, St. Petersburg, 195251
A. Konoplev
Peter the Great St. Petersburg Polytechnic University
Email: busygin_ag@hotmail.com
Россия, St. Petersburg, 195251
M. Kalinin
Peter the Great St. Petersburg Polytechnic University
Email: busygin_ag@hotmail.com
Россия, St. Petersburg, 195251
Дополнительные файлы
