Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates
This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the...
Gespeichert in:
Veröffentlicht in: | Automatic control and computer sciences 2016, Vol.50 (8), p.743-748 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified. |
---|---|
ISSN: | 0146-4116 1558-108X |
DOI: | 10.3103/S0146411616080290 |