期刊文献+

基于SSL/TLS的安全应用中独立端口和磋商升级的研究与实现 被引量:3

SSL/TLS-Based Research and Implementation of Separate Port and Upward Negotiation in Security Applications
下载PDF
导出
摘要 基于SSL/TLS构建的安全应用中通常采用了独立端口和磋商升级的策略。本文详细论述了这两种策略的基本原理,比较了它们各自的优缺点,进而对实施过程中遇到降级攻击以及因代理语义不能交互而导致连接失败的问题进行了分析,并针对这些问题提出了相应的解决办法。 Most SSL/TLS-based security applications adopt two strategies: the separate port strategy and the upward negotiation strategy. This paper discusses the principle of the two strategies and compares the advantages and disadvantages of the two, and then analyzes the problems of downgrade attacks and the difference of semantics causing connection failures which emerge when the two strategies are being implemented. And the solutions to these problems are also promoted.
出处 《计算机工程与科学》 CSCD 2006年第4期23-25,83,共4页 Computer Engineering & Science
关键词 SSL TLS 独立端口 磋商升级 SSL TLS separate port upward negotiation
  • 相关文献

参考文献5

  • 1Alan O Freier. The SSL Protocol Version 3.0[EB/OL].http://www.freesoft.org/CIE/Topics/ssl-draft,1996-03.
  • 2T Dierks. The TLS Protocol Version 1.0[EB/OL].http://www.faqs.org/rfcs/rfc2246.html,1999-01.
  • 3R Khare. Upgrading to TLS Within HTTP/1.1[EB/OL].http://www.faqs.org/rfcs/rfc2817.html,2000-05.
  • 4R Rescorla .The Secure Hypertext Transfer Protocol[EB/OL].http://www.faqs.org/rfcs/rfc2660.html,1999-08.
  • 5Eric Rescorla.崔凯译.SSL and TLS Design and Building Secure System[M].北京:中国电力出版社,2002.

同被引文献12

  • 1Alan O. Freier. The SSL Protocol v3.0 [ J ]. Request For Comments, 1996, ( 3 )
  • 2崔凯.SSL and TLS Design and Building Secure System[M].北京:中国电力出版社,2002:212
  • 3E. Rescorla. HTTP Over TLS[J]. Request For Comments ,2000, ( 5 )
  • 4Alan O.Freier. The SSL Protocol v3.0[s], http://www.freesoft.org/CIE/Topics/ssl-draft March 1996
  • 5T.Dierks. The TLS Protocol Version 1.0[s]. http://www.faqs.org/ffcs/ffc2246.html January 1999
  • 6Eric Reseorla,崔凯译.SSL and TLS Design and Building Secure System[M].中国电力出版社,2002-10
  • 7MANTIN I, SHAMIR A. A Practical Attack on Broadcast RC4[ C]// Proc. of the 8th International Workshop on Fast Software Encryption. [ s. 1. ] : Springer - Vcrlag, 2002 : 157-159.
  • 8KNUDSEN L R, MEIER W, PRENEEL B, et al. Analy- sis Methods for (Alleged) RC4 [ C ]//Asiac; rypt' 98. Berlin: Springer-Velag, 1998 : 327-341.
  • 9ITSIK Mantin, ADI Shamir. A Practical Attack on Broad- cast RC4 [ C ]//Proc. of the 8th International Workshop on Fast Software Encryption. [ s. 1. ] : Springcr-Verlag, 2002:87-104.
  • 10赵伟,曹云飞.RC4的密钥碰撞[J].通信技术,2013,46(12):74-76. 被引量:3

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部