Firm Grip Handshakes: A Tool for Bidirectional Vouching
نویسندگان
چکیده
Clients trust servers over the Internet due to their trust in digital signatures of certification authorities (CAs) which comprise the Internet’s trust infrastructure. Based on the recent DigiNotar attack and other attacks on CAs, we formulate here a very strong attack denoted “Certificate in The Middle” (CiTM) and propose a mitigation for this attack. The solution is embedded in a handshake protocol and makes it more robust: It adds to the usual aspect of “CA vouching” a client side vouching for the server “continuity of service,” thus, allowing clients and server to detect past and future breaches of the trust infrastructure. We had simplicity, flexibility, and scalability in mind, solving the problem within the context of the protocol (with the underlying goal of embedding the solution in the TLS layer) with minor field changes, minimal cryptographic additions, no interaction with other protocol layers, and no added trusted parties.
منابع مشابه
A Flexible Framework for Secret Handshakes
In the society increasingly concerned with the erosion of privacy, privacy-preserving techniques are becoming very important. This motivates research in cryptographic techniques offering built-in privacy. A secret handshake is a protocol whereby participants establish a secure, anonymous and unobservable communication channel only if they are members of the same group. This type of “private” au...
متن کاملA Flexible Framework for Secret Handshakes or: How to Achieve Multi-Party Interactive Anonymous Mutual Authentication
In the society increasingly concerned with the erosion of privacy, privacy-preserving techniques are becoming very important. Secret handshakes offer anonymous and unobservable authentication and serve as an important tool in the arsenal of privacy-preserving techniques. Relevant prior research focused on 2-party secret handshakes with one-time credentials, whereby two parties establish a secur...
متن کاملRepresenting Closed CCS Systems by Petri Nets
This paper describes and proves a simple transformation of CCS composi tions into Petri nets Under certain conditions additional to the CCS syntax rules the resulting Petri nets are nite and ring of their transitions cor responds to handshakes in CCS compositions Such correspondence also holds between simultaneous ring of several transitions and multiple handshakes The transformation has proved...
متن کاملتأثیر قطر ابزار دستی غیر قدرتی در میزان راحتی و حداکثر گشتاور تولید شده دست
Introduction: The weak design of hand tools and their disharmony with the user's physical features comprise a major risk factor for upper limb musculoskeletal disorders. Hand-tool related injuries comprise almost 9% of all work-related injuries. The present study was conducted to examine the effect of hand tools' diameter on comfort and maximum hand torque and to estimate the optimal diame...
متن کاملCryptanalysis of Efficient Unlinkable Secret Handshakes for Anonymous Communications
Several unlinkable secret handshakes schemes have been proposed in recent years. As performing the successful secret handshakes is essentially equivalent to computing a common key between two interactive members of the same group. Therefore secret handshakes scheme is a key agreement protocol between two members of the same group. So it is necessary for a secret handshakes scheme to fulfill sec...
متن کامل