A secure cookie protocol

被引:11
作者
Liu, AX [1 ]
Kovacs, JM [1 ]
Huang, CT [1 ]
Gouda, MG [1 ]
机构
[1] Univ Texas, Dept Comp Sci, Austin, TX 78712 USA
来源
ICCCN 2005: 14TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS | 2005年
关键词
D O I
10.1109/ICCCN.2005.1523880
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cookies are the primary means for web applications to authenticate HTTP requests and to maintain client. states. Many web applications (such is electronic commerce) demand a secure cookie protocol. Such a protocol needs to provide the following four services: authentication, confidentiality, integrity and anti-replay. Several secure cookie protocols have been proposed in previous literature however, none of them are completely satisfactory. In this paper, we propose a secure cookie protocol that is effective, efficient, and easy to deploy. lit terms of effectiveness, Our protocol provides all of the above four security services. In terms of efficiency, our protocol does not involve any database lookup or public key cryptography. In terms of deployability, Our protocol can be easily deployed oil all existing web server, and it does not require any change to the Internet cookie specification. We implemented Our secure cookie protocol using PHP, and the experiment tal results Show that our protocol is very efficient.
引用
收藏
页码:333 / 338
页数:6
相关论文
共 10 条
[1]  
Bellare M, 1996, LNCS, V1109, P1
[2]   A lightweight approach to authenticated web caching [J].
Blundo, C ;
Cimato, S ;
De Prisco, R .
2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2005, :157-163
[3]   TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS [J].
DENNING, DE ;
SACCO, GM .
COMMUNICATIONS OF THE ACM, 1981, 24 (08) :533-536
[4]  
Eastlake D, 2001, RFC3174: US Secure Hash Algorithm 1 (SHA1), VRFC
[5]  
FU K, 2001, P 10 USENIX SEC S AU
[6]  
Krawczyk H., 1997, HMAC KEYED HASHING M, V2014, P1
[7]  
Kristol D., 2000, 2965 RFC
[8]   Secure cookies on the Web [J].
Park, JS ;
Sandhu, R .
IEEE INTERNET COMPUTING, 2000, 4 (04) :36-44
[9]  
Rivest Ronald L., 1992, 1321 RFC
[10]  
Xu DH, 2002, 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P51, DOI 10.1109/CSAC.2002.1176278