Paper Abstract and Keywords |
Presentation |
2010-11-18 09:30
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols
-- A Countermeasure against Compromising of Cryptosystems in SSL -- Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in security protocols are reduced in strength because of an enhancement in the computation power or a new method for decryption. It is called the cryptography compromising problem. It is important for the service providers which use cryptographic communications to take care this problem in order to preserve the security and the connectivity.
In this paper, we discuss about the cryptography compromising problem from the point of view of the service providers. Based on this discussion, we propose that a method to check cryptographic algorithms in security protocols. We focus on the negotiation between the server and the client to extract the cryptographic algorithms used in the security protocol. In addition, we mention a countermeasure against compromising of cryptosystems in SSL by using this method and a compromising list. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Compromising of Cryptosystems / Security Protocols / SSL / Cipher Suites / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 110, no. 282, LOIS2010-39, pp. 73-80, Nov. 2010. |
Paper # |
LOIS2010-39 |
Date of Issue |
2010-11-10 (ISEC, LOIS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ISEC2010-60 LOIS2010-39 |
Conference Information |
Committee |
ISEC LOIS |
Conference Date |
2010-11-17 - 2010-11-18 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Tsukuba Univ. |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
LOIS |
Conference Code |
2010-11-ISEC-LOIS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols |
Sub Title (in English) |
A Countermeasure against Compromising of Cryptosystems in SSL |
Keyword(1) |
Compromising of Cryptosystems |
Keyword(2) |
Security Protocols |
Keyword(3) |
SSL |
Keyword(4) |
Cipher Suites |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Ryota Sato |
1st Author's Affiliation |
NTT information sharing platform laboratories (NTT) |
2nd Author's Name |
Yoshiaki Seki |
2nd Author's Affiliation |
NTT information sharing platform laboratories (NTT) |
3rd Author's Name |
Katsuhiko Yoshida |
3rd Author's Affiliation |
NTT information sharing platform laboratories (NTT) |
4th Author's Name |
Shigeru Kayaguchi |
4th Author's Affiliation |
NTT information sharing platform laboratories (NTT) |
5th Author's Name |
Shinichi Hirata |
5th Author's Affiliation |
NTT information sharing platform laboratories (NTT) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2010-11-18 09:30:00 |
Presentation Time |
30 minutes |
Registration for |
LOIS |
Paper # |
ISEC2010-60, LOIS2010-39 |
Volume (vol) |
vol.110 |
Number (no) |
no.281(ISEC), no.282(LOIS) |
Page |
pp.73-80 |
#Pages |
8 |
Date of Issue |
2010-11-10 (ISEC, LOIS) |
|