期刊文献+

可信增强TLS协议的设计与实现 被引量:1

Design and implementation of trusted enhanced TLS protocol
原文传递
导出
摘要 针对当前应用最为广泛的安全传输层(TLS)协议不能解决通信终端被攻击而造成的信息泄露问题,以及在TLS协议中引入对通信终端的完整性证明带来的安全性和兼容性问题,提出了与标准TLS协议兼容,并且支持对通信双方进行完整性证明的可信增强TLS协议的设计与实现方案.该方案完成了通信双方的完整性信息的交换和验证,从而解决了因通信终端的完整性遭到破坏而造成的信息泄露问题.此外,提出了TLS协议中通信终端的身份与完整性信息的绑定方案,从而有效避免了重放攻击.最后对协议的安全性进行了分析证明,并对协议实现情况进行了测试,测试结果表明可信增强TLS协议与标准TLS协议兼容且具有良好的性能. Transport layer security(TLS)protocol is widely used in the network security field.The TLS protocol does not provide any protection from malicious endpoint and may lead to information leakage.Recent approaches aimed to solve this problem by additionally providing integrity information of the involved endpoints during the handshake process of TLS.However,these solutions have either security or compatibility problems which prevents them from deploying in practice.In this paper,the design and implementation of a trusted enhanced TLS protocol was presented,which supported integrity attestation and was compatible with the standard TLS protocol.Making use of remote attestation proposed by the trusted computing group,trusted platform module(TPM)mechanisms and encrypted tunnel,our design effectively built the linkage between the integrity information and actual tunnel endpoint thus avoiding the relay attack.In the end,the security analysis of the trusted enhanced TLS protocol was given,and the implementation and compatibility test of the protocol was presented.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2016年第3期44-48,共5页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 中国科学院战略性先导科技专项资助项目(XDA06040502 XDA06010701)
关键词 可信计算 安全传输层(TLS)协议 远程证明 可信平台模块 重放攻击 可信信道 trusted computing transport layer security(TLS)protocol remote attestation trusted platform module relay attack trusted channel
  • 相关文献

参考文献14

  • 1Dierks T, Rescorla E. The transport layer security (TLS) protocol version 1. 2 [-EB/OL]. E2015-06- 07~. http ://www. iet{. org/rfc/rfc4346.
  • 2Karaduzovic-Hadziahdic, Modelling and analysing the TLS protocol using Casper and FIDR[C~//Proc of 2012 IX International Symposium on Telecommunica- tions (BIHTEL). Sarajevo: 1EEE, 2012: 1-6.
  • 3Trusted Computing Group. TCG specification archi- tecture overviewrEB/OL~. [2015-06-071. http: // www. trustedeomputinggroup, org/resources/tcg-ar chitect ure-overview-version- 14.
  • 4Balfe S, Gallery E, Mitchell C J, et al. Challenges for trusted computing[J]. IEEE Security and Priva- cy, 2008, 6(6): 60 66.
  • 5张大伟,韩臻,蒋逸尘,黎妹红.基于DAA和TLS的匿名远程证明协议[J].华中科技大学学报(自然科学版),2014,42(11):28-33. 被引量:2
  • 6Kenneth G,Ronald P,Reiner S. Linking remote attes- tation to secure tunnel endpoints[C]//'Proceedings of the 2006 ACM Workshop on Scalable Trusted Com puting. New York: ACM, 2006: 21-24.
  • 7Gasmi Y, Sadeghi, Stewin P, et al. Beyond secure channels[C] // Proceedings of the 2007 ACM Work- shop on Scalable Trusted Computing. New York: ACM, 2007: 30-40.
  • 8Armknecht F, Gasmi Y, Sadeghi A R, et al. An effi- cient implementation of trusted channels based on OpenSSLFC~ // Proceedings of the 2008 ACM Work- shop on Scalable Trusted Computing. New York: ACM, 2008:41 50.
  • 9Santesson S. TLS handshake message for supplemen- tal dataJ-EB/OI.~. E2015-06-07~. http://www, ietf. org/rfc/rfc4680.
  • 10Blake-Wilson S, Nystrom M, Hopwood D, et al. Transport layer security extensions [- EB/()L 1. E2015 06-07~. http://www, ietf. org/rfc/rfc4366.

二级参考文献9

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 2[1]Trusted computing group.Trusted platform module main specification Version 1.2[S].2005.
  • 3[2]Sailer R,Zhang X,Jaeger T,et al.Design and implementation of a TCG-based integrity measurement architecture[C]//Proceedings of the 13th Usenix Security Symposium.California:Usenix,2004:223-238.
  • 4[3]biba K J.Integrity considerations for secure computer systems[R].ESD-TR-76-372,Bedford,MA:USAF Electronic Systems Division,Hanscom Air Force Base,1977.
  • 5[4]Oppliger R,Rytz R.Does trusted computing remedy computer security problem[J].Security & Privacy Magazine(IEEE),2005,3(2):16-19.
  • 6[5]Felten E W.Understanding trusted computing:Will its benefits outweigh its drawbacks[J].Security & Privacy Magazine(IEEE),2003,1(3):60-62.
  • 7[6]Iliev A,Smith S W.Protecting client privacy with trusted computing at the server[J].Security & Privacy Magazine(IEEE),2005,3(2):20-28.
  • 8杨力,张俊伟,马建峰,刘志宏.改进的移动计算平台直接匿名证明方案[J].通信学报,2013,34(6):69-75. 被引量:5
  • 9张大伟,韩臻,蒋逸尘,杜晔,黎妹红.Protocol for Trusted Channel Based on Portable Trusted Module[J].China Communications,2013,10(11):1-14. 被引量:1

共引文献10

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部