搜索结果: 1-15 共查到“军事学 tls”相关记录46条 . 查询时间(0.359 秒)
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH
post-quantum cryptography TLS SSH
2019/7/25
Once algorithms for quantum-resistant key exchange and digital signature schemes are selected by standards bodies, adoption of post-quantum cryptography will depend on progress in integrating those al...
TLS (Transport Layer Security) is a widely deployed protocol that plays a vital role in securing Internet trafic. Given the numerous known attacks for TLS 1.2, it was imperative to change and even red...
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
applied cryptography provable security TLS
2019/4/29
Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions...
Continuing to reflect on TLS 1.3 with external PSK
TLS 1.3 pre-shared key post-handshake authentication
2019/4/28
The TLS protocol is the main cryptographic protocol of the Internet. The work on its current version, TLS 1.3, was completed in 2018. This version differs from the previous ones and has been developed...
Selfie: reflections on TLS 1.3 with PSK
Reflection attack Network security Multi-Stage Key Exchange model
2019/4/3
TLS 1.3 allows two parties to establish a shared session key from an out-of-band agreed Pre Shared Key (PSK) is used to mutually authenticate the parties, under the assumption that it is not shared wi...
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
session resumption forward secrecy 0-RTT
2019/3/4
The TLS 1.3 0-RTT mode enables a client reconnecting to a server to send encrypted application-layer data in "0-RTT" ("zero round-trip time"), without the need for a prior interactive handshake. This ...
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
TLS Bleichenbacher Side-channels
2018/12/3
Over the last twenty years researchers and implementors had spent a huge amount of effort in developing and deploying numerous mitigation techniques which were supposed to plug all the possible source...
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
Lucky 13 attack TLS Side-channel cache attacks
2018/8/20
Today, about 10% of TLS connections are still using CBC-mode cipher suites, despite a long history of attacks and the availability of better options (e.g. AES-GCM). In this work, we present three new ...
Partially specified channels: The TLS 1.3 record layer without elision
cryptographic standards TLS 1.3 stream-based channels
2018/7/2
This work advances the study of secure stream-based channels (Fischlin et al., CRYPTO ’15) by considering the multiplexing of many data streams over a single channel. This is an essential feature of r...
Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3
key exchange hybrid key exchange
2018/1/2
Broken cryptographic algorithms and hardness assumptions are a constant threat to real-world protocols. Prominent examples are hash functions for which collisions become known, or number-theoretic ass...
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Authenticated Key Exchange Implementation Post-quantum
2017/12/19
Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CT-RSA 2017. Following this work, we give much more efficient and portable C++ implementation of these two ...
Secure Channels and Termination: The Last Word on TLS
Secure channels stateful length-hiding authenticated encryption (stLHAE) authenticated encryption with associated data (AEAD)
2017/8/21
Secure channels are one of the most pivotal building blocks of cryptography today. Internet connections, secure messaging, protected IoT data, etc., all rely upon the security of the underlying channe...
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation
non-repudiation blockchain TLS
2017/6/22
An internet user wanting to share observed content is typically restricted to primitive techniques such as screenshots, web caches or share button-like solutions. These acclaimed proofs, however, are ...
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
SSL/TLS reproducible analysis
2017/2/20
Over the years, SSL/TLS has become an essential part of Internet security. As such, it should offer robust and state-of-the-art security, in particular for HTTPS, its first application. Theoretically,...
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
protocol analysis zero round-trip time composition
2017/2/20
We investigate security of key exchange protocols supporting so-called zero round-trip time (0-RTT), enabling a client to establish a fresh provisional key without interaction, based only on cryptogra...