Cipher suite setting problem of SSL protocol and it's solutions

Yunyoung Lee, Soonhaeng Hur, Dongho Won, Seungjoo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

As the use of Internet is being generalized, the security problems about data transfer are rearing up as the important issue. There are many security protocols to solve the problems and the SSL(Secure Socket layer) protocol is the most widely used one among them. While the SSL protocol is designed to defend the client from active attacks such as message forgery and message alteration, the cipher suite setting can be easily modified. If the attacker draws on a malfunction of the client system and modifies the software's cipher suite setting to the symmetric key algorithm which has short key length, he can eavesdrop and cryptanalyze the encrypted data. In this paper, we examine the web sites whether they generate the security session through the symmetric key algorithm which has short key length and propose the solution of the cipher suite setting problem.

Original languageEnglish
Title of host publicationProceedings - 2009 International Conference on Advanced Information Networking and Applications Workshops, WAINA 2009
Pages140-146
Number of pages7
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 International Conference on Advanced Information Networking and Applications Workshops, WAINA 2009 - Bradford, United Kingdom
Duration: 2009 May 262009 May 29

Publication series

NameProceedings - International Conference on Advanced Information Networking and Applications, AINA
ISSN (Print)1550-445X

Other

Other2009 International Conference on Advanced Information Networking and Applications Workshops, WAINA 2009
CountryUnited Kingdom
CityBradford
Period09/5/2609/5/29

Keywords

  • Cipher suite
  • SSL
  • Secure socket layer
  • Security

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Cipher suite setting problem of SSL protocol and it's solutions'. Together they form a unique fingerprint.

  • Cite this

    Lee, Y., Hur, S., Won, D., & Kim, S. (2009). Cipher suite setting problem of SSL protocol and it's solutions. In Proceedings - 2009 International Conference on Advanced Information Networking and Applications Workshops, WAINA 2009 (pp. 140-146). [5136638] (Proceedings - International Conference on Advanced Information Networking and Applications, AINA). https://doi.org/10.1109/WAINA.2009.76