scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Proceedings ArticleDOI
01 Oct 2012
TL;DR: In this article, the TLS Handshake protocol is analyzed in a progressive manner, by gradually building the protocol's messages and message fields, and the importance of each message and message field to the overall achievement of the security goal of TLS protocol is identified.
Abstract: This paper analyses the TLS Handshake protocol in a progressive manner, by gradually building the protocol's messages and message fields Messages constituting the TLS protocol are described by Casper, a compiler for the analysis of security protocols FDR, a model checking tool is then used to test whether the protocol achieves its goals It has been shown that TLS achieves its security goals for the systems tested By using this progressive approach of the TLS Handshake analysis, this paper identifies the importance of each message and message field to the overall achievement of the security goal of the TLS protocol The study also shows that the TLS protocol contains much redundancy A few important points that show how TLS has been carefully designed to thwart some attacks that have appeared in many of the previous security protocols are also emphasized

1 citations

Patent
11 Dec 2018
TL;DR: In this paper, the authors proposed a communication method and a system for a mixed mode mobile application, a client and a server, which consists of the following steps: a socket is created; whether an HTTP request of a WebSocket connection sent by the client is received is monitored in real-time by the socket, the header information of the HTTP request comprising handshake information; obtaining handshake information in the header of the request when the request is received; generating a network byte array according to the handshake information.
Abstract: The invention provides a communication method and a system for a mixed mode mobile application, a client and a server The method comprises the following steps: a socket is created; whether an HTTP request of a WebSocket connection sent by the client is received is monitored in real time by the socket,the header information of the HTTP request comprising handshake information; obtaining handshakeinformation in the header information of the HTTP request when the HTTP request is received; generating a network byte array according to the handshake information; according to the network byte arrayand handshake information, generating the response information of WebSocket connection; sending the response information to the client to enable the client to verify the response information; when the response information is verified, realizing the WebSocket connection with the client Mixed-mode mobile applications with clients communicate in real time over a WebSocket connection The inventioncan reduce the consumption of communication resources

1 citations

Patent
25 Jun 2019
TL;DR: In this article, the authors proposed a secure communication method for TLS or DTLS handshake, which comprises the steps: enabling a server to generate a session bill, recording the information related to the secure communication such as a master key successfully negotiated by the server and a client in a handshake process, and sending the identifier of the session bill to the client.
Abstract: The invention provides a secure communication method, and the method comprises the steps: enabling a server to generate a session bill, recording the information related to the secure communication such as a master key successfully negotiated by the server and a client in a handshake process, and sending the identifier of the session bill to the client; when the client needs to carry out TLS or DTLS handshake with the server again, the client carrying the identifier of the session bill in the handshake request, and the server acquiring the corresponding session bill according to the identifierof the session bill, reusing the successfully negotiated information related to the safety communication in the previous TLS or DTLS handshake flow, and completing the handshake flow with the client.According to the secure communication method, the performance consumption of the TLS or DTLS handshake flow to the client and the server is reduced, and the identifier of the session bill only needsto occupy less bytes, so that the identifier of the session bill does not occupy too much storage space of the client and does not waste communication resources.

1 citations

Patent
21 Sep 2018
TL;DR: In this paper, a hidden data transmission synchronization method based on protocol field redundancy under a P2P network is proposed, which is easy to deploy and low-cost in implementation, and advantageously guarantees accuracy and imperceptibility of transmitting and receiving of the hidden data.
Abstract: The invention discloses a hidden data transmission synchronization method based on protocol field redundancy under a P2P network. On the basis of a Handshake message in the P2P network, by modification of a redundant part of a peer-id field in the Handshake message, acknowledgement of node identity information, secret key negotiation, transmitting and receiving acknowledgement of data and channelinactivation, and so on, can be realized. The hidden data transmission synchronization method provided by the invention not only is easy to deploy and low-cost in implementation, but also advantageously guarantees accuracy and imperceptibility of transmitting and receiving of the hidden data.

1 citations

Patent
28 Nov 2019
TL;DR: In this article, an enhanced serial peripheral interface (eSPI) bus is used to connect a master device to a plurality of slave devices via the eSPI bus, and a first resistor is coupled between the alert handshake control line and a power supply.
Abstract: A bus system is provided. The bus system includes a master device, an enhanced serial peripheral interface (eSPI) bus, a plurality of slave devices electrically connected to the master device via the eSPI bus, and a first resistor. Each slave device has an alert handshake pin. The alert handshake pins of the slave devices are electrically connected together via an alert handshake control line. The first resistor is coupled between the alert handshake control line and a power supply. Each slave device obtains the number of slave devices according to a first voltage of the alert handshake control line.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877