Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates

This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Automatic control and computer sciences 2016, Vol.50 (8), p.743-748
Hauptverfasser: Busygin, A. G., Konoplev, A. S., Kalinin, M. O.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.
ISSN:0146-4116
1558-108X
DOI:10.3103/S0146411616080290