Topic
Handshake
About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.
Papers published on a yearly basis
Papers
More filters
•
29 Nov 2007TL;DR: In this paper, a method may include receiving handshake signals to establish a media session between at least two endpoints, determining location information of the at least 2 endpoints based on the handshake signals, and releasing media exchanged between the endpoints if it is determined that the location information indicates that the end points are in the same location.
Abstract: A method may include receiving handshake signals to establish a media session between at least two endpoints, determining location information of the at least two endpoints based on the handshake signals, and releasing media exchanged between the at least two endpoints if it is determined that the location information of the at least two endpoints indicates that the at least two endpoints are in a same location.
2 citations
•
2 citations
•
TL;DR: In this paper, Dodis et al. proposed a new security model for both the handshake and record layers, a signed, Diffie-Hellman based secure channel protocol, and showed how to design a provably secure reverse firewall for it.
Abstract: Reverse firewalls (RFs) were introduced by Mironov and Stephens-Davidowitz to address algorithm-substitution attacks (ASAs) in which an adversary subverts the implementation of a provably-secure cryptographic primitive to make it insecure. This concept was applied by Dodis et al. in the context of secure key exchange (handshake phase), where the adversary wants to exfiltrate sensitive information by using a subverted client implementation. RFs are used as a means of “sanitizing” the client-side protocol in order to prevent this exfiltration. In this paper, we propose a new security model for both the handshake and record layers, a.k.a. secure channel. We present a signed, Diffie-Hellman based secure channel protocol, and show how to design a provably-secure reverse firewall for it. Our model is stronger since the adversary has a larger surface of attacks, which makes the construction challenging. Our construction uses classical and off-the-shelf cryptography.
2 citations
•
01 Jan 2010
TL;DR: From this security proof it is got that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore.
Abstract: In this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these protocols were deemed secure as well. All the security proofs are based on the UC (Universal Composability) security framework.
2 citations
••
25 May 2003
TL;DR: The simulation results show that the proposed new handshake methodology has shortest latency and more robust property as compare with other handshake methodologies.
Abstract: In this paper, a new handshake methodology to enhance the performance of the asynchronous micro-pipeline systems is proposed. The proposed handshake methodology has more flexibilities to design an asymmetric asynchronous micro-pipeline system. The proposed handshake methodology also has some advantages, like latch free, robust, high throughput, very short pre-charge time, less transistors, and more flexibility in asymmetry data path. A technique that combines a single-rail dynamic circuit with a dual-rail dynamic circuit was proposed and used to design in the data path. In the critical delay data paths, the dual-rail dynamic circuits were used to improve the operating speed. Others, the single-rail dynamic circuits were used. It brings some advantages that reduce power consumption and die area while maintaining the calculation speed. An asynchronous micro-pipeline array multiplier was designed and implemented by the new robust handshake methodology. Based on the TSMC 0.35/spl mu/m CMOS technology, the simulation results show that the proposed new handshake methodology has shortest latency and more robust property as compare with other handshake methodologies.
2 citations