Topic
Handshake
About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.
Papers published on a yearly basis
Papers
More filters
••
••
18 May 2022TL;DR: In this article , the authors proposed a public key infrastructure (PKI) method for encapsulating messages between the client and the server while doing the TLS handshake process, which removes the need for credentials, including client-server certificates and clientserver key exchange.
Abstract: The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure Socket Layer (SSL) and Transport Layer Security (TLS) enable data encryption and authentication between various homogeneous and heterogeneous devices such as servers, computers, and software applications running all over a network. These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. When communicating between client and server, these algorithms address challenges like confidentiality, integrity, availability, and non-repudiation. The significant challenge faced is the attack on these protocols. Among the reported attacks on TSL is the Drown attack which is a prevalent type of attack. In order to prevent such types of attacks, a Public Key Infrastructure (PKI) method is proposed in this study for encapsulating messages between the client and the server while doing the TLS handshake process. The proposed method removes the need for credentials, including client-server certificates and client-server key exchange.
••
01 Jan 2023
TL;DR: In this article , the authors have identified the loopholes of Wi-Fi encryption protocols and tested them on a test network with various WEP, WPA and WPA2 in a controlled laboratory setup.
Abstract: In the twenty-first century as the technology evolves in a rapid pace, more and more number of users and businesses are getting connected to the Internet. A vast majority of these users use the wireless mode (Wi-Fi) for getting connected to the Internet. As the number of users and the online transactions rises in billions so is the risk of a cyber-fraud, due to the vulnerabilities present in the Wi-Fi protocols (WEP, WPA and WPA2). Security remains a huge challenge as Wi-Fi passwords could be cracked from both home and enterprise-level networks by using the tools and by performing social engineering attacks. Data protection is a huge challenge for computer scientists, and in this work, the investigators have identified the loopholes of Wi-Fi encryption protocols. The identification procedures are tested on a test network with various Wi-Fi encryption protocols in a controlled laboratory setup. Data packets from the wireless networks could be easily sniffed by using aircrack-ng software suite for capturing the handshake and ultimately for cracking the password from huge wordlists. The process of cracking the password could also be speed up by using a Graphics Processing Unit (GPU) which performs set of repetitive tasks in a faster way and helps in extracting passwords. The overall investigation helps investigators to understand the vulnerabilities present in the modern-day Wi-Fi protocols. Hence, it has been proposed the use of RADIUS server model like in an enterprise network and the use of Wi-Max standard of security for better safety measures.
•
19 Dec 2019TL;DR: In this article, different methods of separation of signaling to arrange P2MP handshake procedures based on existing Point-to-Point (P2P) handshake procedures have been discussed in connection with various DSL (Direct Subscriber Line) technologies.
Abstract: Techniques discussed herein can facilitate handshake procedures for Point-to-Multipoint (P2MP) communication in connection with various DSL (Direct Subscriber Line) technologies. Various embodiments can employ different methods of separation of signaling to arrange P2MP handshake procedures based on existing Point-to-Point (P2P) handshake procedures. Example embodiments can employ one of separation in frequency, separation in time, or separation in transmission power level.