The TLS Handshake Protocol: A Modular Analysis

被引:0
作者
P. Morrissey
N. P. Smart
B. Warinschi
机构
[1] University of Bristol,Department Computer Science
来源
Journal of Cryptology | 2010年 / 23卷
关键词
Provable security; TLS; SSL;
D O I
暂无
中图分类号
学科分类号
摘要
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modularity present in the design of the protocol: the application keys offered to higher-level applications are obtained from a master key, which in turn is derived through interaction from a pre-master key.
引用
收藏
页码:187 / 223
页数:36
相关论文
共 6 条
  • [1] Cramer R.(2003)Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 167-226
  • [2] Shoup V.(1992)Authentication and authenticated key exchange Des. Codes Cryptogr. 2 107-125
  • [3] Diffie W.(1999)Inductive analysis of the Internet protocol TLS ACM Trans. Inf. Syst. Secur. 2 332-351
  • [4] van Oorschot P.C.(undefined)undefined undefined undefined undefined-undefined
  • [5] Weiner M.J.(undefined)undefined undefined undefined undefined-undefined
  • [6] Paulson L.(undefined)undefined undefined undefined undefined-undefined