scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Proceedings ArticleDOI
18 May 2022
TL;DR: In this article , the authors proposed a public key infrastructure (PKI) method for encapsulating messages between the client and the server while doing the TLS handshake process, which removes the need for credentials, including client-server certificates and clientserver key exchange.
Abstract: The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure Socket Layer (SSL) and Transport Layer Security (TLS) enable data encryption and authentication between various homogeneous and heterogeneous devices such as servers, computers, and software applications running all over a network. These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. When communicating between client and server, these algorithms address challenges like confidentiality, integrity, availability, and non-repudiation. The significant challenge faced is the attack on these protocols. Among the reported attacks on TSL is the Drown attack which is a prevalent type of attack. In order to prevent such types of attacks, a Public Key Infrastructure (PKI) method is proposed in this study for encapsulating messages between the client and the server while doing the TLS handshake process. The proposed method removes the need for credentials, including client-server certificates and client-server key exchange.
Book ChapterDOI
01 Jan 2023
TL;DR: In this article , the authors have identified the loopholes of Wi-Fi encryption protocols and tested them on a test network with various WEP, WPA and WPA2 in a controlled laboratory setup.
Abstract: In the twenty-first century as the technology evolves in a rapid pace, more and more number of users and businesses are getting connected to the Internet. A vast majority of these users use the wireless mode (Wi-Fi) for getting connected to the Internet. As the number of users and the online transactions rises in billions so is the risk of a cyber-fraud, due to the vulnerabilities present in the Wi-Fi protocols (WEP, WPA and WPA2). Security remains a huge challenge as Wi-Fi passwords could be cracked from both home and enterprise-level networks by using the tools and by performing social engineering attacks. Data protection is a huge challenge for computer scientists, and in this work, the investigators have identified the loopholes of Wi-Fi encryption protocols. The identification procedures are tested on a test network with various Wi-Fi encryption protocols in a controlled laboratory setup. Data packets from the wireless networks could be easily sniffed by using aircrack-ng software suite for capturing the handshake and ultimately for cracking the password from huge wordlists. The process of cracking the password could also be speed up by using a Graphics Processing Unit (GPU) which performs set of repetitive tasks in a faster way and helps in extracting passwords. The overall investigation helps investigators to understand the vulnerabilities present in the modern-day Wi-Fi protocols. Hence, it has been proposed the use of RADIUS server model like in an enterprise network and the use of Wi-Max standard of security for better safety measures.
Patent
19 Dec 2019
TL;DR: In this article, different methods of separation of signaling to arrange P2MP handshake procedures based on existing Point-to-Point (P2P) handshake procedures have been discussed in connection with various DSL (Direct Subscriber Line) technologies.
Abstract: Techniques discussed herein can facilitate handshake procedures for Point-to-Multipoint (P2MP) communication in connection with various DSL (Direct Subscriber Line) technologies. Various embodiments can employ different methods of separation of signaling to arrange P2MP handshake procedures based on existing Point-to-Point (P2P) handshake procedures. Example embodiments can employ one of separation in frequency, separation in time, or separation in transmission power level.

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877