scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Book ChapterDOI
14 Dec 2009
TL;DR: This paper introduces a hardware/software co-design approach for accelerating SSL protocol execution in resource-restricted devices and executes a full SSL handshake using an elliptic curve over a 192-bit prime field in less than 300 msec when the SPARC processor is clocked at 20 MHz.
Abstract: Modern mobile devices like cell phones or PDAs allow for a level of network connectivity similar to that of standard PCs, making access to the Internet possible from anywhere at anytime. Going along with this evolution is an increasing demand for cryptographically secure network connections with such resource-restricted devices. The Secure Sockets Layer (SSL) protocol is the current de-facto standard for secure communication over an insecure network like the Internet and provides protection against eavesdropping, message forgery and replay attacks. To achieve this, the SSL protocol employs a set of computation-intensive cryptographic algorithms, in particular public-key algorithms, which can result in unacceptably long delays on devices with modest processing capabilities. In this paper we introduce a hardware/software co-design approach for accelerating SSL protocol execution in resource-restricted devices. The software part of our co-design consists of MatrixSSLTM, a lightweight SSL implementation into which we integrated elliptic curve cryptography (ECC) to speed up the public-key operations performed during the SSL handshake. The hardware part comprises a SPARC V8 compliant processor core with instruction set extensions to support the low-level arithmetic operations carried out in ECC. Our co-design executes a full SSL handshake using an elliptic curve over a 192-bit prime field in less than 300 msec when the SPARC processor is clocked at 20 MHz. A pure software implementation like OpenSSL is, depending on the field type and order, up to a factor of 10 slower than our co-design solution.

4 citations

Patent
22 May 2002
TL;DR: In this paper, a method and system for establishing a first type of connection, wherein a handshake processing is performed with the other party of the first connection, is described. But this method is not suitable for the case where the other parties does not support the handshake processing, and a fallback procedure is started to change the call to a second type during connection establishment.
Abstract: The invention relates to a method and system for establishing a first type of connection, wherein a handshake processing is performed with the other party of the first type of connection. If the handshake processing is successful, the first type of connection is established. If the handshake processing is not successful, i.e. the other party does not support the first type of connection, a fallback procedure is started to change the call to a second type of connection determined during the connection establishment. The change to the second type of connection may be performed directly or may be based on a call retry procedure. Thereby, inconvenient disconnections or error processings at the end terminals can be prevented.

4 citations

Patent
17 Jul 2014
TL;DR: In this paper, a first intermediary and a second intermediary can split-terminate a secure connection handshake or a handshake renegotiation between two computing devices, and the first and second intermediaries can then optimize secure communications between the two devices.
Abstract: Systems and techniques are described for optimizing secure communications. Specifically, a first intermediary and a second intermediary can split-terminate a secure connection handshake or a handshake renegotiation between two computing devices. The first and second intermediaries can then optimize secure communications between the two computing devices.

4 citations

Proceedings ArticleDOI
01 Mar 2016
TL;DR: This paper presents a new randomized algorithm to solve the handshake problem in a distributed system designed for an asynchronous distributed network of anonymous processes under the message passing communication protocol.
Abstract: Distributed systems have been studied thoroughly. Many applications are based on huge systems and one of the main property an algorithm running on such systems should verified is fault-tolerance. This paper presents a new randomized algorithm to solve the handshake problem in a distributed system. This algorithm is designed for an asynchronous distributed network ofanonymous processes under the message passing communication protocol. In addition to its fault-tolerance, this algorithm is more effective than the existing ones thanks to its asynchronous aspect. To highlight its performance, we provide an experimental evaluation by comparing it to the most representative algorithm solving the handshake problem. The experimentation is done using Visidia, a tool for simulating and visualizing distributed algorithms.

4 citations

01 Dec 2010
TL;DR: New constructions for unlinkable secret handshake are provided, allowing arbitrary two communication parties with the same role in either one single group or multiple groups to privately authenticate each other.
Abstract: The technique of secret handshake is used as a fundamental building block for anonymous peer-to-peer communications over untrusted networks. However, the fact that most existing schemes fail to meet unlinkability causes the use of schemes to limit for practical use. In this paper, we provide new constructions for unlinkable secret handshake, allowing arbitrary two communication parties with the same role in either one single group or multiple groups to privately authenticate each other. Compared to previous works, our techniques have much better performance in terms of both computational and communication cost, while they obtain good security results.

4 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877