scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Book ChapterDOI
Bin Li1
18 Jun 2009
TL;DR: Forward secrecy attribute has been added in the scheme, and a practicable WTLS handshake protocol has been designed on XTR system, and the conclusion can be drawn that the security and practicability of WTLS protocol has be greatly improved.
Abstract: Because of the lack of the forward secrecy and the indefensibility from intermediator attacks and DOS attacks in WTLS, the security of current WTLS handshake protocol is far from satisfactory. In this paper we propose a new WTLS handshake protocol to solve these problems. Forward secrecy attribute has been added in the scheme, and a practicable WTLS handshake protocol has been designed on XTR system. Experiments have been taken on MSM6280 platform and the result turns out that the above security problems were efficiently solved and achieve a good performance on popular embedded platform. The conclusion can be drawn that the security and practicability of WTLS protocol has been greatly improved.

1 citations

Patent
05 Feb 2016
TL;DR: In this article, a TCP handshake is distributed by having an initiator device send, to a server (220) SYN(m) with the IP address of a terminator device (230) as source address.
Abstract: A TCP handshake is distributed by having an initiator device (210) send, to a server (220) SYN(m) with the IP address of a terminator device (230) as source address. The initiator device can then forget any TCP state for the SYN(m). The server (230) responds with a SYN-ACK(m+1, n) according to the normal TCP handshake, but the response goes to the terminator device (230) that receives (S310) the message, reconstructs (S320) the TCP handshake as if it had sent the initial SYN message, and sends (S330) an ACK(n+1) to the server (220). The TCP handshake method can be used to avoid allocation of resources in for example device monitoring.

1 citations

Journal ArticleDOI
TL;DR: The vulnerability of the shadowsocks(R) encryption mechanism is found, and an attack method of shadowsocks (R) is proposed, which is a passive attack and can decrypt the shadowsock packets encrypted with any encryption option.
Abstract: Shadowsocks(R) is a proxy software based on Socks5, which is the collective name of shadowsocks and shadowsocksR. Shadowsocks(R) is a private protocol without a handshake negotiation mechanism. Peng broke the confidentiality of shadowsocks by exploiting vulnerability in the shadowsocks protocol and decrypted the shadowsocks packets encrypted with none-AEAD encryption options using a redirection attack. Chen et al. started with the cryptographic algorithm used by shadowsocks(R) and preliminarily discussed the confidentiality of user data under the protection of shadowsocks(R) in theory. Based on Chen’s work, this paper further clarifies the shadowsocks(R) protocol format and studies the encryption mechanism of shadowsocks(R) from the perspective of protocol analysis. The vulnerability of the shadowsocks(R) encryption mechanism is found, and an attack method of shadowsocks(R) is proposed. The attack method is a passive attack and can decrypt the shadowsocks packets encrypted with any encryption option. Compared with Peng’s attack method, the method is more effective and more suitable for actual attacks. Finally, some methods to improve the protocol security of shadowsocks(R) are proposed.

1 citations

Proceedings ArticleDOI
05 May 2022
TL;DR: An analysis of PPTP implemented by Microsoft is conducted, including an introduction to the structure of Microsoft's PPTP, followed by an in-depth analysis of the Microsoft version of the Challenge-Handshake Authentication Protocol (MS-CHAP) and Microsoft Point-to-Point Encryption (MPPE) subprotocols.
Abstract: Point-to-Point Tunneling Protocol (PPTP) is a mature way to implement Virtual Private Network (VPN), which has been widely used by many companies and enterprises. The security of VPN mainly depends on the security of the protocol, so the analysis of the protocol has always been the top priority of network security. This paper conducts an analysis of PPTP implemented by Microsoft. In this paper, I first give an introduction to the structure of Microsoft's PPTP, followed by an in-depth analysis of the Microsoft version of the Challenge-Handshake Authentication Protocol (MS-CHAP) and Microsoft Point-to-Point Encryption (MPPE) subprotocols. And in the second half of this paper, I analyze and implement a man-in-the-middle attack on Microsoft's PPTP that does not require the challenge packet.

1 citations

Patent
02 Jan 2020
TL;DR: In this paper, a peer-to-peer (P2P) communication protocol was proposed, in which the first device may authenticate the second device based on at least a second portion of the pairing code in the second broadcast message.
Abstract: Methods and systems for peer-to-peer communication are provided. In one example, a first device may receive, from a server, a pairing code and a first handshake code. The first device may transmit at least a first portion of the pairing code in a first broadcast message and receive, from the second device, a second broadcast message. The first device may authenticate the second device based on at least a second portion of the pairing code in the second broadcast message. The first device may establish a wireless peer-to-peer communication channel with the second device, and receive, from the second device, a second handshake code via the wireless peer-to-peer communication channel. The first device may authorize the second party to engage in an offline interaction with the first party based on the first handshake code and the second handshake code.

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877