Fortification of Transport Layer Security Protocol
نویسنده
چکیده
Proving an identity over a public link is complex when there is communication between Client and Server. Secure Shell protocol is deployed, to determine a client's identity through Password-based key exchange schemes, over a public network, by sharing a (short) password only, with a session key. Most of the existing schemes are vulnerable to various dictionary attacks. SSL is the de facto standard today for securing end to end transport. While the protocol seems rather secure there are a number of risks which lurk in its use. The focus of the paper is on the analysis of very efficient schemes on password-based authenticated key-exchange methods. In this paper analysis of AuthA key exchange scheme and DH-EKE is done and complete proof of its security is generated. Evidences are generated to show that the AuthA and DH_EKE protocol and its multiple modes of operation are secure under the computational Diffie-Hellman intractability assumption and help in fortification of transport layer security protocol.
منابع مشابه
Survey for Generating an Ideal Password Authentication Scheme Which Results In Fortification of Transport Layer Security Protocol
Fortification of transport layer security protocol is required because whenever there is communication between Client and Server over a public link, then proving an identity becomes quiet complex. When resources are to be accessed from remote systems through public network then identity authentication parameters are the de-facto-standard. Paper elucidates upon various authentication parameters ...
متن کاملFortification of Transport Layer Security Protocol with Hashed Fingerprint Identity Parameter
Identity over the public links becomes quiet complex as Client and Server needs proper access rights with authentication. For determining clients identity with password Secured Shell Protocol or Public Key Infrastructure is deployed by various organizations. For end to end transport security SSL (Secured Socket Layer) is the de facto standard having Record and Handshake protocol dealing with da...
متن کاملFortification of Transport Layer Security Protocol by using Password and Fingerprint as Identity Authentication Parameters
Whenever there is communication between Client and Server over a public link and resources are to be accessed from remote systems, then proving an identity becomes quiet complex because there is need of proper access rights with authentication. Complete security at the transport layer starts with proof of authentication, majority organizations only use password for security but this research pa...
متن کاملLightweight Security Enhancement Protocol for Radio Frequency Identification(RFID)
Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security loopholes and thus finally proposed a modi...
متن کاملStatus of This Memo Datagram Transport Layer Security
This document specifies Version 1.0 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provid...
متن کامل